[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:700293
It was discovered that Python incorrectly handled certain arguments in the imageop module. If an attacker were able to pass specially crafted arguments through the crop function, they could execute arbitrary code with user privileges. For Python 2.5, this issue only affected Ubuntu 8.04 LTS. Multip ...

oval:org.secpod.oval:def:17190
The host is installed with Python 2.2.3 through 2.5.1 or 2.6 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_ex ...

oval:org.secpod.oval:def:300536
Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnera ...

oval:org.secpod.oval:def:202194
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:500692
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:200462
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:500551
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:500535
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:202139
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:200633
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

CPE    5
cpe:/a:python:python:2.2.3
cpe:/a:python:python:2.5.1
cpe:/a:python:python:2.3.7
cpe:/a:python:python:2.4.6
...
CWE    1
CWE-189
*CVE
CVE-2008-5031

© SecPod Technologies