A vulnerability, which was classified as problematic, was found in Microsoft Windows 2000. This affects an unknown part of the component Management Console. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2006-3643. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Office up to XP. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Filename Handler. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2006-3649. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in Adobe Flash Player up to 9.0. This affects an unknown part of the component SWF File Handler. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2006-3587. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Microsoft Internet Explorer up to 6. This vulnerability affects unknown code of the component HTML Render Handler. The manipulation leads to memory corruption.
This vulnerability was named CVE-2006-3637. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in Microsoft Internet Explorer up to 6. Affected is an unknown function of the component Script Handler. The manipulation leads to Remote Code Execution.
This vulnerability is traded as CVE-2006-3639. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Microsoft Windows 2000/Server 2003/XP and classified as problematic. This vulnerability affects unknown code of the component Winlogon. The manipulation leads to improper access controls.
This vulnerability was named CVE-2006-3443. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in HP-UX B.11.11/B.11.23. It has been classified as critical. Affected is an unknown function of the component DCE. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2012-0131. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows. It has been rated as very critical. This issue affects some unknown processing in the library msvcrt.dll. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2012-0150. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in Microsoft Windows 7/Server 2008/Vista and classified as problematic. Affected by this vulnerability is an unknown functionality of the component DirectWrite Unicode Character Parser. The manipulation leads to improper input validation.
This vulnerability is known as CVE-2012-0156. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in HP ProCurve -/Id116as0hr/Id116as04p/Id117as00h/Id126as0fb and classified as critical. Affected by this vulnerability is an unknown functionality of the component Compact Flash Card. The manipulation leads to insecure inherited permissions.
This vulnerability is known as CVE-2012-0133. Local access is required to approach this attack. Furthermore, there is an exploit available. Due to its background and reception, this vulnerability has an historic impact.
A worm is spreading, which is automatically exploiting this vulnerability.
A vulnerability was found in Microsoft .NET Framework up to 4.5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Parameter Validator. The manipulation of the argument Function leads to improper input validation.
This vulnerability is known as CVE-2012-0163. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in Microsoft Windows 7/Server 2003/Server 2008/Vista/XP. Affected is the function PostMessage of the file win32k.sys. The manipulation leads to improper input validation.
This vulnerability is traded as CVE-2012-0157. The attack needs to be approached locally. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Apple iTunes up to 12.7.4 on Windows and classified as critical. Affected by this issue is some unknown functionality of the component WebKit. The manipulation leads to use after free.
This vulnerability is handled as CVE-2018-4200. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
Yoran's Passing Comes 10 Months After Cancer Diagnosis, 1 Month After Taking Leave Amit Yoran - a West Point graduate who founded NetWitness, sold the company to RSA and took Tenable public - died Friday. He was 54. Yoran was diagnosed in March 2024 with a treatable form of cancer, and in December temporarily stepped away from his role as Tenable's CEO to get additional treatment.
Yoran's Passing Comes 10 Months After Cancer Diagnosis, 1 Month After Taking Leave Amit Yoran - a West Point graduate who founded NetWitness, sold the company to RSA and took Tenable public - died Friday. He was 54. Yoran was diagnosed in March 2024 with a treatable form of cancer, and in December temporarily stepped away from his role as Tenable's CEO to get additional treatment.