VMware Workstation and VMware Player are prone to a stack overflow when parsing a specially crafted ISO file.
Promotic SCADA is prone to a vulnerability that may allow execution of mfc71enu if this dll is located in the same folder than .PRA file.
The Administration Console of Oracle GlassFish Server is prone to an authentication bypass vulnerability, which can be achieved by performing HTTP TRACE requests. A remote unauthenticated attacker can exploit this in order to execute arbitrary code on the vulnerable server.
This update adds support for Solaris platforms.
This update adds support for Solaris platforms.
This module adds support for Mac OS X and Solaris platforms.
The vulnerability is a memory corruption in the U3D component in Adobe Reader when handling a specially crafted PDF file.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WebKit in Apple Safari before 5.0.6 has improper libxslt security settings, which allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via a crafted web site.
A backdoor introduced in the source code of MyBB allows remote unauthenticated attackers to execute arbitrary code on systems running vulnerable installations of MyBB.
This update adds support for the Solaris platform.
This update adds support for the Solaris platform.
An unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/ directory.
This update adds support for Mac OS X and Solaris platforms.
The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter.
Pagination
- Previous page
- Page 84
- Next page