Lucene search

K

CVE-2008-0553

🗓️ 07 Feb 2008 21:00:00Reported by redhatType 
cve
 cve
🔗 web.nvd.nist.gov👁 94 Views

Stack-based buffer overflow in ReadImage function in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via crafted GIF image

Show more
Related
Detection
Refs
ReporterTitlePublishedViews
Family
OpenVAS
Fedora Update for tk FEDORA-2008-1122
13 Feb 200900:00
openvas
OpenVAS
Fedora Update for tk FEDORA-2008-1122
13 Feb 200900:00
openvas
OpenVAS
Fedora Update for tk FEDORA-2008-1131
13 Feb 200900:00
openvas
OpenVAS
Fedora Update for tk FEDORA-2008-1131
13 Feb 200900:00
openvas
OpenVAS
Fedora Update for tkimg FEDORA-2008-3621
17 Feb 200900:00
openvas
OpenVAS
Fedora Update for perl-Tk FEDORA-2008-1384
16 Feb 200900:00
openvas
OpenVAS
Debian: Security Advisory (DSA-1598-1)
27 Jun 200800:00
openvas
OpenVAS
Fedora Update for tkimg FEDORA-2008-3621
17 Feb 200900:00
openvas
OpenVAS
Debian Security Advisory DSA 1598-1 (libtk-img)
28 Jun 200800:00
openvas
OpenVAS
Ubuntu Update for tk8.0, tk8.3, tk8.4 vulnerability USN-664-1
23 Mar 200900:00
openvas
Rows per page
Nvd
Node
tcl_tktcl_tkRange8.4.17
OR
tcl_tktcl_tkMatch2.1
OR
tcl_tktcl_tkMatch3.3
OR
tcl_tktcl_tkMatch4.0p1
OR
tcl_tktcl_tkMatch6.1
OR
tcl_tktcl_tkMatch6.1p1
OR
tcl_tktcl_tkMatch6.2
OR
tcl_tktcl_tkMatch6.4
OR
tcl_tktcl_tkMatch6.5
OR
tcl_tktcl_tkMatch6.6
OR
tcl_tktcl_tkMatch6.7
OR
tcl_tktcl_tkMatch7.0
OR
tcl_tktcl_tkMatch7.1
OR
tcl_tktcl_tkMatch7.3
OR
tcl_tktcl_tkMatch7.4
OR
tcl_tktcl_tkMatch7.5
OR
tcl_tktcl_tkMatch7.5p1
OR
tcl_tktcl_tkMatch7.6
OR
tcl_tktcl_tkMatch7.6p2
OR
tcl_tktcl_tkMatch8.0
OR
tcl_tktcl_tkMatch8.0.3
OR
tcl_tktcl_tkMatch8.0.4
OR
tcl_tktcl_tkMatch8.0.5
OR
tcl_tktcl_tkMatch8.0p2
OR
tcl_tktcl_tkMatch8.1
OR
tcl_tktcl_tkMatch8.1.1
OR
tcl_tktcl_tkMatch8.2.0
OR
tcl_tktcl_tkMatch8.2.1
OR
tcl_tktcl_tkMatch8.2.2
OR
tcl_tktcl_tkMatch8.2.3
OR
tcl_tktcl_tkMatch8.3.0
OR
tcl_tktcl_tkMatch8.3.1
OR
tcl_tktcl_tkMatch8.3.2
OR
tcl_tktcl_tkMatch8.3.3
OR
tcl_tktcl_tkMatch8.3.4
OR
tcl_tktcl_tkMatch8.3.5
OR
tcl_tktcl_tkMatch8.4.0
OR
tcl_tktcl_tkMatch8.4.1
OR
tcl_tktcl_tkMatch8.4.2
OR
tcl_tktcl_tkMatch8.4.3
OR
tcl_tktcl_tkMatch8.4.4
OR
tcl_tktcl_tkMatch8.4.5
OR
tcl_tktcl_tkMatch8.4.6
OR
tcl_tktcl_tkMatch8.4.7
OR
tcl_tktcl_tkMatch8.4.8
OR
tcl_tktcl_tkMatch8.4.9
OR
tcl_tktcl_tkMatch8.4.10
OR
tcl_tktcl_tkMatch8.4.11
OR
tcl_tktcl_tkMatch8.4.12
OR
tcl_tktcl_tkMatch8.4.13
OR
tcl_tktcl_tkMatch8.4.14
OR
tcl_tktcl_tkMatch8.4.15
OR
tcl_tktcl_tkMatch8.4.16
OR
tcl_tktcl_tkMatch8.4a2
OR
tcl_tktcl_tkMatch8.4a3
OR
tcl_tktcl_tkMatch8.4a4
OR
tcl_tktcl_tkMatch8.4b1
OR
tcl_tktcl_tkMatch8.4b2
OR
tcl_tktcl_tkMatch8.5.0
OR
tcl_tktcl_tkMatch8.5_a3
OR
tcl_tktcl_tkMatch8.5a1
OR
tcl_tktcl_tkMatch8.5a2
OR
tcl_tktcl_tkMatch8.5a3
OR
tcl_tktcl_tkMatch8.5a4
OR
tcl_tktcl_tkMatch8.5a5
OR
tcl_tktcl_tkMatch8.5a6
OR
tcl_tktcl_tkMatch8.5b1
OR
tcl_tktcl_tkMatch8.5b2
OR
tcl_tktcl_tkMatch8.5b3

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
07 Feb 2008 21:00Current
10High risk
Vulners AI Score10
CVSS26.8
EPSS0.193
94
.json
Report