Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2006-1176

    Buffer overflow in eBay Enhanced Picture Services (aka EPUImageControl Class) in EUPWALcontrol.dll before 1.0.3.48, as used in Sell Your Item (SYI), Setup & Test eBay Enhanced Picture Services, Picture Manager Enhanced Uploader, and CARad.com Add Vehicle,... Read more

    Affected Products : enhanced_picture_services
    • Published: Jul. 08, 2006
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-2006-3458

    Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw" command when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows local users to read arbitrary files.... Read more

    Affected Products : zope
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2006-2451

    The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl fu... Read more

    Affected Products : linux_kernel
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2006-3431

    Buffer overflow in certain Asian language versions of Microsoft Excel might allow user-assisted attackers to execute arbitrary code via a crafted STYLE record in a spreadsheet that triggers the overflow when the user attempts to repair the document or sel... Read more

    Affected Products : excel
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2006-3413

    The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the "logfile", which allows attackers to obtain potentially sensitive information.... Read more

    Affected Products : tor
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 6.4

    MEDIUM
    CVE-2006-3412

    Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.... Read more

    Affected Products : tor
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2006-3427

    Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) by declaring the sourceURL attribute on an uninitialized DirectAnimation.StructuredGraphicsControl ActiveX Object, which triggers a null dereference.... Read more

    Affected Products : internet_explorer
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2006-3410

    Tor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit nodes," which allows remote attackers to conduct unspecified statistical attacks.... Read more

    Affected Products : tor
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 6.4

    MEDIUM
    CVE-2006-3415

    Tor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors.... Read more

    Affected Products : tor
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 6.4

    MEDIUM
    CVE-2006-3411

    TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.... Read more

    Affected Products : tor
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 9.3

    HIGH
    CVE-2006-3423

    WebEx Downloader ActiveX Control and WebEx Downloader Java before 2.1.0.0 do not validate downloaded components, which allows remote attackers to execute arbitrary code via a website that activates the GpcUrlRoot and GpcIniFileName ActiveX controls to cau... Read more

    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2006-3425

    FastPatch for (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1, and (b) Novell ZENworks 6.2 SR1 and earlier, does not require authentication for dagent/proxyreg.asp, which allows remote attackers to list, add, or delete PatchLi... Read more

    Affected Products : zenworks patchlink_update_server
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2006-3430

    SQL injection vulnerability in checkprofile.asp in (1) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (2) Novell ZENworks 6.2 SR1 and earlier, allows remote attackers to execute arbitrary SQL commands via the agentid paramete... Read more

    Affected Products : zenworks patchlink_update_server
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 5.8

    MEDIUM
    CVE-2006-3405

    Cross-site scripting (XSS) vulnerability in qtofm.php in QTOFileManager 1.0 allows remote attackers to inject arbitrary web script or HTML via the (1) delete, (2) pathext, and (3) edit parameters.... Read more

    Affected Products : qtofilemanager
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2006-3426

    Directory traversal vulnerability in (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (b) Novell ZENworks 6.2 SR1 and earlier allows remote attackers to overwrite arbitrary files and directories via a .. (dot dot) sequence ... Read more

    Affected Products : zenworks patchlink_update_server
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 6.4

    MEDIUM
    CVE-2006-3407

    Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.... Read more

    Affected Products : tor
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2006-3419

    Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute fo... Read more

    Affected Products : tor
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2006-3409

    Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists.... Read more

    Affected Products : tor
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2006-3418

    Tor before 0.1.1.20 does not validate that a server descriptor's fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications.... Read more

    Affected Products : tor
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2006-3424

    Multiple buffer overflows in WebEx Downloader ActiveX Control, possibly in versions before November 2005, allow remote attackers to execute arbitrary code via unspecified vectors.... Read more

    Affected Products : webex_downloader_activex_control
    • Published: Jul. 07, 2006
    • Modified: Apr. 03, 2025
Showing 20 of 294274 Results