257221
|
- |
|
emery_berger
|
hoard
|
Multiple integer overflows in the (1) malloc and (2) calloc functions in Hoard before 3.9 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows on …
|
CWE-189
Numeric Errors
|
CVE-2012-2676
|
2012-07-30 13:00 |
2012-07-26 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
257222
|
- |
|
invensys
|
foxboro_control_software infusion_ce\/fe\/scada intouch intouch\/wonderware_application_server wonderware_historian wonderware_inbatch wonderware_information_server
|
Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/…
|
NVD-CWE-Other
|
CVE-2012-3005
|
2012-07-30 13:00 |
2012-07-26 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
257223
|
- |
|
invensys
|
foxboro_control_software infusion_ce\/fe\/scada intouch intouch\/wonderware_application_server wonderware_historian wonderware_inbatch wonderware_information_server
|
Per: http://cwe.mitre.org/data/definitions/426.html
'CWE-426: Untrusted Search Path'
|
NVD-CWE-Other
|
CVE-2012-3005
|
2012-07-30 13:00 |
2012-07-26 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
257224
|
- |
|
siemens
|
simatic_pcs7 simatic_step_7
|
Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier and other products, allows local users to gain privileges via a Trojan horse D…
|
NVD-CWE-Other
|
CVE-2012-3015
|
2012-07-30 13:00 |
2012-07-26 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
257225
|
- |
|
siemens
|
simatic_pcs7 simatic_step_7
|
Per: http://cwe.mitre.org/data/definitions/426.html
'CWE-426: Untrusted Search Path'
|
NVD-CWE-Other
|
CVE-2012-3015
|
2012-07-30 13:00 |
2012-07-26 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
257226
|
- |
|
apple
|
safari
|
WebKit in Apple Safari before 6.0 does not properly handle drag-and-drop events, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site.
|
CWE-20
Improper Input Validation
|
CVE-2012-3689
|
2012-07-30 13:00 |
2012-07-26 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
257227
|
- |
|
apple
|
safari
|
WebKit in Apple Safari before 6.0 does not properly handle file: URLs, which allows remote attackers to bypass intended sandbox restrictions and read arbitrary files by leveraging a WebProcess compro…
|
CWE-264
Permissions, Privileges, and Access Controls
|
CVE-2012-3697
|
2012-07-30 13:00 |
2012-07-26 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
257228
|
- |
|
comodo
|
comodo_antivirus
|
The Microsoft Office file parser in Comodo Antivirus 7425 allows remote attackers to bypass malware detection via an Office file with a \50\4B\53\70\58 character sequence at a certain location.
|
CWE-264
Permissions, Privileges, and Access Controls
|
CVE-2012-1437
|
2012-07-28 12:30 |
2012-03-21 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
257229
|
- |
|
aladdin fortinet pandasecurity rising-global
|
esafe fortinet_antivirus panda_antivirus rising_antivirus
|
The ELF file parser in eSafe 7.0.17.0, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file wit…
|
CWE-264
Permissions, Privileges, and Access Controls
|
CVE-2012-1439
|
2012-07-28 12:30 |
2012-03-21 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
257230
|
- |
|
aladdin fortinet pandasecurity prevx
|
esafe fortinet_antivirus panda_antivirus prevx
|
The ELF file parser in eSafe 7.0.17.0, Prevx 3.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified abiver…
|
CWE-264
Permissions, Privileges, and Access Controls
|
CVE-2012-1444
|
2012-07-28 12:30 |
2012-03-21 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|