Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-0049

Summary
Assigner-debian
Assigner Org ID-79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At-13 Mar, 2006 | 21:00
Updated At-07 Aug, 2024 | 16:18
Rejected At-
Credits

gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:debian
Assigner Org ID:79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At:13 Mar, 2006 | 21:00
Updated At:07 Aug, 2024 | 16:18
Rejected At:
▼CVE Numbering Authority (CNA)

gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://usn.ubuntu.com/264-1/
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/19249
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/0915
vdb-entry
x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2006-0266.html
vendor-advisory
x_refsource_REDHAT
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
vendor-advisory
x_refsource_SGI
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
mailing-list
x_refsource_MLIST
http://securityreason.com/securityalert/450
third-party-advisory
x_refsource_SREASON
http://secunia.com/advisories/19232
third-party-advisory
x_refsource_SECUNIA
http://www.osvdb.org/23790
vdb-entry
x_refsource_OSVDB
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
vendor-advisory
x_refsource_SLACKWARE
http://secunia.com/advisories/19173
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/433931/100/0/threaded
vendor-advisory
x_refsource_FEDORA
http://www.securityfocus.com/bid/17058
vdb-entry
x_refsource_BID
http://securityreason.com/securityalert/568
third-party-advisory
x_refsource_SREASON
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/19287
third-party-advisory
x_refsource_SECUNIA
http://www.trustix.org/errata/2006/0014
vendor-advisory
x_refsource_TRUSTIX
http://securitytracker.com/id?1015749
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/19532
third-party-advisory
x_refsource_SECUNIA
http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html
vendor-advisory
x_refsource_SUSE
http://www.gentoo.org/security/en/glsa/glsa-200603-08.xml
vendor-advisory
x_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilities/25184
vdb-entry
x_refsource_XF
http://secunia.com/advisories/19234
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/19197
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/19244
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/19203
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:055
vendor-advisory
x_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/427324/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/19231
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-993
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://usn.ubuntu.com/264-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/19249
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/0915
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0266.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://securityreason.com/securityalert/450
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://secunia.com/advisories/19232
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.osvdb.org/23790
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://secunia.com/advisories/19173
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/433931/100/0/threaded
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.securityfocus.com/bid/17058
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://securityreason.com/securityalert/568
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/19287
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.trustix.org/errata/2006/0014
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://securitytracker.com/id?1015749
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/19532
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200603-08.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/25184
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/19234
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/19197
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/19244
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/19203
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:055
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.securityfocus.com/archive/1/427324/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/19231
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2006/dsa-993
Resource:
vendor-advisory
x_refsource_DEBIAN
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://usn.ubuntu.com/264-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/19249
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/0915
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0266.html
vendor-advisory
x_refsource_REDHAT
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
vendor-advisory
x_refsource_SGI
x_transferred
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
mailing-list
x_refsource_MLIST
x_transferred
http://securityreason.com/securityalert/450
third-party-advisory
x_refsource_SREASON
x_transferred
http://secunia.com/advisories/19232
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.osvdb.org/23790
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://secunia.com/advisories/19173
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/433931/100/0/threaded
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.securityfocus.com/bid/17058
vdb-entry
x_refsource_BID
x_transferred
http://securityreason.com/securityalert/568
third-party-advisory
x_refsource_SREASON
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/19287
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.trustix.org/errata/2006/0014
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://securitytracker.com/id?1015749
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/19532
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200603-08.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/25184
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/19234
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/19197
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/19244
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/19203
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:055
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.securityfocus.com/archive/1/427324/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/19231
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2006/dsa-993
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://usn.ubuntu.com/264-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/19249
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/0915
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0266.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://securityreason.com/securityalert/450
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://secunia.com/advisories/19232
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.osvdb.org/23790
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://secunia.com/advisories/19173
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/433931/100/0/threaded
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/17058
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://securityreason.com/securityalert/568
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/19287
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.trustix.org/errata/2006/0014
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://securitytracker.com/id?1015749
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/19532
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200603-08.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/25184
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/19234
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/19197
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/19244
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/19203
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:055
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/427324/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/19231
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-993
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@debian.org
Published At:13 Mar, 2006 | 21:06
Updated At:03 Apr, 2025 | 01:03

gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

GNU
gnu
>>privacy_guard>>1.0
cpe:2.3:a:gnu:privacy_guard:1.0:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.0.1
cpe:2.3:a:gnu:privacy_guard:1.0.1:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.0.2
cpe:2.3:a:gnu:privacy_guard:1.0.2:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.0.3
cpe:2.3:a:gnu:privacy_guard:1.0.3:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.0.3b
cpe:2.3:a:gnu:privacy_guard:1.0.3b:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.0.4
cpe:2.3:a:gnu:privacy_guard:1.0.4:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.0.5
cpe:2.3:a:gnu:privacy_guard:1.0.5:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.0.6
cpe:2.3:a:gnu:privacy_guard:1.0.6:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.0.7
cpe:2.3:a:gnu:privacy_guard:1.0.7:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.2
cpe:2.3:a:gnu:privacy_guard:1.2:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.2.1
cpe:2.3:a:gnu:privacy_guard:1.2.1:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.2.2
cpe:2.3:a:gnu:privacy_guard:1.2.2:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.2.2
cpe:2.3:a:gnu:privacy_guard:1.2.2:rc1:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.2.3
cpe:2.3:a:gnu:privacy_guard:1.2.3:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.2.4
cpe:2.3:a:gnu:privacy_guard:1.2.4:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.2.5
cpe:2.3:a:gnu:privacy_guard:1.2.5:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.2.6
cpe:2.3:a:gnu:privacy_guard:1.2.6:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.2.7
cpe:2.3:a:gnu:privacy_guard:1.2.7:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.3.3
cpe:2.3:a:gnu:privacy_guard:1.3.3:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.3.4
cpe:2.3:a:gnu:privacy_guard:1.3.4:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.4
cpe:2.3:a:gnu:privacy_guard:1.4:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.4.1
cpe:2.3:a:gnu:privacy_guard:1.4.1:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.4.2
cpe:2.3:a:gnu:privacy_guard:1.4.2:*:*:*:*:*:*:*
GNU
gnu
>>privacy_guard>>1.4.2.1
cpe:2.3:a:gnu:privacy_guard:1.4.2.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-Usecurity@debian.org
N/A
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.htmlsecurity@debian.org
Patch
Vendor Advisory
http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.htmlsecurity@debian.org
N/A
http://secunia.com/advisories/19173security@debian.org
Patch
Vendor Advisory
http://secunia.com/advisories/19197security@debian.org
N/A
http://secunia.com/advisories/19203security@debian.org
N/A
http://secunia.com/advisories/19231security@debian.org
N/A
http://secunia.com/advisories/19232security@debian.org
N/A
http://secunia.com/advisories/19234security@debian.org
N/A
http://secunia.com/advisories/19244security@debian.org
N/A
http://secunia.com/advisories/19249security@debian.org
N/A
http://secunia.com/advisories/19287security@debian.org
N/A
http://secunia.com/advisories/19532security@debian.org
N/A
http://securityreason.com/securityalert/450security@debian.org
N/A
http://securityreason.com/securityalert/568security@debian.org
N/A
http://securitytracker.com/id?1015749security@debian.org
Patch
http://www.debian.org/security/2006/dsa-993security@debian.org
Patch
Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200603-08.xmlsecurity@debian.org
Patch
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:055security@debian.org
N/A
http://www.osvdb.org/23790security@debian.org
Patch
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.htmlsecurity@debian.org
N/A
http://www.redhat.com/support/errata/RHSA-2006-0266.htmlsecurity@debian.org
N/A
http://www.securityfocus.com/archive/1/427324/100/0/threadedsecurity@debian.org
N/A
http://www.securityfocus.com/archive/1/433931/100/0/threadedsecurity@debian.org
N/A
http://www.securityfocus.com/bid/17058security@debian.org
Patch
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477security@debian.org
N/A
http://www.trustix.org/errata/2006/0014security@debian.org
N/A
http://www.vupen.com/english/advisories/2006/0915security@debian.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/25184security@debian.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063security@debian.org
N/A
https://usn.ubuntu.com/264-1/security@debian.org
N/A
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-Uaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/19173af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://secunia.com/advisories/19197af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/19203af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/19231af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/19232af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/19234af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/19244af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/19249af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/19287af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/19532af854a3a-2127-422b-91ae-364da2661108
N/A
http://securityreason.com/securityalert/450af854a3a-2127-422b-91ae-364da2661108
N/A
http://securityreason.com/securityalert/568af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1015749af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.debian.org/security/2006/dsa-993af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200603-08.xmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:055af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/23790af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2006-0266.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/427324/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/433931/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/17058af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.trustix.org/errata/2006/0014af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/0915af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/25184af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063af854a3a-2127-422b-91ae-364da2661108
N/A
https://usn.ubuntu.com/264-1/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
Source: security@debian.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/19173
Source: security@debian.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/19197
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/19203
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/19231
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/19232
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/19234
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/19244
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/19249
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/19287
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/19532
Source: security@debian.org
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/450
Source: security@debian.org
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/568
Source: security@debian.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015749
Source: security@debian.org
Resource:
Patch
Hyperlink: http://www.debian.org/security/2006/dsa-993
Source: security@debian.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200603-08.xml
Source: security@debian.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:055
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.osvdb.org/23790
Source: security@debian.org
Resource:
Patch
Hyperlink: http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0266.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/427324/100/0/threaded
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/433931/100/0/threaded
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/17058
Source: security@debian.org
Resource:
Patch
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.trustix.org/errata/2006/0014
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/0915
Source: security@debian.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/25184
Source: security@debian.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063
Source: security@debian.org
Resource: N/A
Hyperlink: https://usn.ubuntu.com/264-1/
Source: security@debian.org
Resource: N/A
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/19173
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/19197
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/19203
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/19231
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/19232
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/19234
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/19244
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/19249
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/19287
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/19532
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/450
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/568
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015749
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.debian.org/security/2006/dsa-993
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200603-08.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:055
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/23790
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0266.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/427324/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/433931/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/17058
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.trustix.org/errata/2006/0014
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/0915
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/25184
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://usn.ubuntu.com/264-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

22Records found

CVE-2006-4790
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-3.08% / 86.22%
||
7 Day CHG~0.00%
Published-14 Sep, 2006 | 19:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.

Action-Not Available
Vendor-n/aGNU
Product-gnutlsn/a
CVE-2016-6321
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-12.72% / 93.73%
||
7 Day CHG~0.00%
Published-09 Dec, 2016 | 22:00
Updated-06 Aug, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.

Action-Not Available
Vendor-n/aGNU
Product-tarn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2004-1488
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-13.30% / 93.90%
||
7 Day CHG~0.00%
Published-15 Feb, 2005 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.

Action-Not Available
Vendor-n/aGNU
Product-wgetn/a
CVE-2004-1487
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.69% / 70.84%
||
7 Day CHG~0.00%
Published-15 Feb, 2005 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.

Action-Not Available
Vendor-n/aGNU
Product-wgetn/a
CVE-2010-4226
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.51% / 65.31%
||
7 Day CHG~0.00%
Published-06 Feb, 2014 | 16:00
Updated-09 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cpio, as used in build 2007.05.10, 2010.07.28, and possibly other versions, allows remote attackers to overwrite arbitrary files via a symlink within an RPM package archive.

Action-Not Available
Vendor-n/aGNUopenSUSE
Product-cpioopensusen/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2002-1344
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.76% / 72.44%
||
7 Day CHG~0.00%
Published-11 Dec, 2002 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in wget before 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences.

Action-Not Available
Vendor-n/aGNUSun Microsystems (Oracle Corporation)
Product-cobalt_raq_xtrwgetn/a
CVE-2002-1216
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.75% / 72.18%
||
7 Day CHG~0.00%
Published-21 Oct, 2002 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU tar 1.13.19 and other versions before 1.13.25 allows remote attackers to overwrite arbitrary files via a symlink attack, as the result of a modification that effectively disabled the security check.

Action-Not Available
Vendor-n/aGNU
Product-tarn/a
CVE-2009-1417
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.58% / 67.79%
||
7 Day CHG~0.00%
Published-30 Apr, 2009 | 20:00
Updated-07 Aug, 2024 | 05:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and expiration times of X.509 certificates, which allows remote attackers to successfully present a certificate that is (1) not yet valid or (2) no longer valid, related to lack of time checks in the _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls_x509, as used by (a) Exim, (b) OpenLDAP, and (c) libsoup.

Action-Not Available
Vendor-n/aGNU
Product-gnutlsn/a
CWE ID-CWE-310
Not Available
CVE-2019-12290
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.53% / 84.84%
||
7 Day CHG~0.00%
Published-22 Oct, 2019 | 15:14
Updated-04 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.

Action-Not Available
Vendor-n/aGNU
Product-libidn2n/a
CWE ID-CWE-20
Improper Input Validation
CVE-2001-0072
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.96% / 75.54%
||
7 Day CHG~0.00%
Published-07 May, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.

Action-Not Available
Vendor-n/aGNU
Product-privacy_guardn/a
CVE-2015-0282
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.27% / 50.23%
||
7 Day CHG~0.00%
Published-24 Mar, 2015 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.

Action-Not Available
Vendor-n/aGNU
Product-gnutlsn/a
CVE-2021-43396
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.04%
||
7 Day CHG~0.00%
Published-04 Nov, 2021 | 19:52
Updated-04 Aug, 2024 | 04:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states "the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there's no security impact to the bug.

Action-Not Available
Vendor-n/aOracle CorporationGNU
Product-communications_cloud_native_core_unified_data_repositorycommunications_cloud_native_core_network_function_cloud_native_environmentcommunications_cloud_native_core_security_edge_protection_proxycommunications_cloud_native_core_network_repository_functioncommunications_cloud_native_core_binding_support_functionglibcenterprise_operations_monitorn/a
CVE-2007-1263
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-17.69% / 94.85%
||
7 Day CHG~0.00%
Published-06 Mar, 2007 | 20:00
Updated-07 Aug, 2024 | 12:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

Action-Not Available
Vendor-gnupgn/aGNU
Product-gnupggpgmen/a
CVE-2016-8605
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 26.20%
||
7 Day CHG~0.00%
Published-12 Jan, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2.0.13. Prior versions are affected.

Action-Not Available
Vendor-n/aFedora ProjectGNU
Product-fedoraguilen/a
CVE-2016-7444
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-0.75% / 72.25%
||
7 Day CHG~0.00%
Published-27 Sep, 2016 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.

Action-Not Available
Vendor-n/aGNU
Product-gnutlsn/a
CVE-2016-4456
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.47%
||
7 Day CHG~0.00%
Published-08 Aug, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The "GNUTLS_KEYLOGFILE" environment variable in gnutls 3.4.12 allows remote attackers to overwrite and corrupt arbitrary files in the filesystem.

Action-Not Available
Vendor-n/aGNU
Product-gnutlsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2005-1228
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.58% / 88.80%
||
7 Day CHG~0.00%
Published-22 Apr, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.

Action-Not Available
Vendor-n/aGNU
Product-gzipn/a
CVE-2015-0294
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.58% / 68.02%
||
7 Day CHG~0.00%
Published-27 Jan, 2020 | 15:12
Updated-06 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.

Action-Not Available
Vendor-GnuTLSRed Hat, Inc.Debian GNU/LinuxGNU
Product-debian_linuxgnutlsenterprise_linuxGnuTLS
CWE ID-CWE-295
Improper Certificate Validation
CVE-2013-7423
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.15% / 86.38%
||
7 Day CHG~0.00%
Published-24 Feb, 2015 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

Action-Not Available
Vendor-n/aGNUopenSUSERed Hat, Inc.Canonical Ltd.
Product-enterprise_linux_server_ausopensuseglibcubuntu_linuxn/a
CVE-2007-1269
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.18% / 77.86%
||
7 Day CHG~0.00%
Published-06 Mar, 2007 | 20:00
Updated-07 Aug, 2024 | 12:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNUMail 1.1.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents GNUMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.

Action-Not Available
Vendor-n/aGNU
Product-gnumailn/a
CVE-2002-0399
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.20% / 78.09%
||
7 Day CHG~0.00%
Published-01 Oct, 2002 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in GNU tar 1.13.19 through 1.13.25, and possibly later versions, allows attackers to overwrite arbitrary files during archive extraction via a (1) "/.." or (2) "./.." string, which removes the leading slash but leaves the "..", a variant of CVE-2001-1267.

Action-Not Available
Vendor-n/aGNU
Product-tarn/a
CVE-2014-10375
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.35% / 56.80%
||
7 Day CHG~0.00%
Published-14 Aug, 2019 | 04:46
Updated-06 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.

Action-Not Available
Vendor-n/aGNU
Product-exosipn/a
CWE ID-CWE-189
Not Available
Details not found