Vulnerability Name: | CVE-2006-4980 (CCN-29408) | ||||||||||||||||||||||||
Assigned: | 2006-08-16 | ||||||||||||||||||||||||
Published: | 2006-08-16 | ||||||||||||||||||||||||
Updated: | 2023-08-02 | ||||||||||||||||||||||||
Summary: | |||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: cve@mitre.org Type: Patch, Third Party Advisory cve@mitre.org Source: CCN Type: Full-Disclosure Mailing List, Mon Jan 08 2007 - 20:17:36 CST VMware ESX server security updates Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Issue Tracking cve@mitre.org Source: MITRE Type: CNA CVE-2006-4980 Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: CCN Type: RHSA-2006-0713 python security update Source: CCN Type: RHSA-2008-0264 Moderate: Red Hat Network Satellite Server Solaris client security update Source: CCN Type: RHSA-2008-0525 Moderate: Red Hat Network Satellite Server Solaris client security update Source: CCN Type: RHSA-2008-0629 Moderate: Red Hat Network Satellite Server Solaris client security update Source: CCN Type: SA22276 Python "repr()" Unicode String Buffer Overflow Vulnerability Source: CCN Type: SA22379 Avaya Python "repr()" Unicode String Buffer Overflow Vulnerability Source: CCN Type: SA23680 VMWare ESX Server Multiple Vulnerabilities Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: CCN Type: SECTRACK ID: 1017019 Python repr() Processing of UTF-32/UCS-4 Strings May Let Remote Users Deny Service or Execute Arbitrary Code Source: cve@mitre.org Type: Third Party Advisory, VDB Entry cve@mitre.org Source: CCN Type: SourceForge.net: Detail [ 1541585 ] buffer overrun in repr() for unicode strings Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: CCN Type: ASA-2006-229 python security update (RHSA-2006-0713) Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: DEBIAN Type: DSA-1197 python2.4 -- buffer overflow Source: DEBIAN Type: DSA-1198 python2.3 -- buffer overflow Source: CCN Type: GLSA-200610-07 Python: Buffer Overflow Source: cve@mitre.org Type: Broken Link, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: CCN Type: Python Web site Python Language Website Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory, VDB Entry cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory, VDB Entry cve@mitre.org Source: CCN Type: BID-20376 Python Repr() Function Remote Code Execution Vulnerability Source: cve@mitre.org Type: Third Party Advisory, VDB Entry cve@mitre.org Source: CCN Type: USN-359-1 Python vulnerability Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Broken Link cve@mitre.org Source: cve@mitre.org Type: Broken Link cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Broken Link, VDB Entry cve@mitre.org Source: XF Type: UNKNOWN python-repr-bo(29408) Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Broken Link cve@mitre.org Source: SUSE Type: SUSE-SR:2006:025 SUSE Security Summary Report | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |