A vulnerability has been found in Samsung NET-i viewer 1.37 and classified as critical. Affected by this issue is the function RequestScreenOptimization in the library msls31.dll of the file XProcessControl.ocx of the component OCX ActiveX Control. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2012-4250. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability labeled as problematic has been found in VMare Workstation, Fusion, ESX and Player 8.0.4. This issue affects some unknown processing in the library tpfc.dll of the component Library Handler. The manipulation leads to untrusted search path.
The identification of this vulnerability is CVE-2012-1666. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in Symantec PGP Desktop up to 10.1.1. Affected by this vulnerability is an unknown functionality of the component Encryption. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2012-6533. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability identified as critical has been detected in Steve J Baker PLIB 1.8.5. Affected is the function Error of the component Error Message Handler. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2012-4552. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability identified as critical has been detected in VMware Workstation, Player and Fusion on Windows. This vulnerability affects unknown code in the library TPView.ddl. The manipulation leads to memory corruption.
This vulnerability was named CVE-2012-0897. The attack needs to be approached locally. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in Activestate ActivePerl 5.16.1.1601. This affects an unknown part in the library wlbsctrl.dll of the component Installation. The manipulation leads to untrusted search path.
This vulnerability is uniquely identified as CVE-2012-5377. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in Activestate ActiveTcl 8.5.12. This vulnerability affects unknown code in the library wlbsctrl.dll of the component Installation. The manipulation leads to untrusted search path.
This vulnerability was named CVE-2012-5378. The attack needs to be approached locally. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in Activestate ActivePython 3.2.2.3. This issue affects some unknown processing in the library wlbsctrl.dll of the component Installation. The manipulation leads to untrusted search path.
The identification of this vulnerability is CVE-2012-5379. An attack has to be approached locally. Furthermore, there is an exploit available.
The real existence of this vulnerability is still doubted at the moment.
A vulnerability classified as critical was found in Cisco Firepower Management Center and Firepower Threat Defense. This issue affects some unknown processing of the component CLI. The manipulation leads to os command injection.
The identification of this vulnerability is CVE-2025-20220. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Fortinet FortiSIEM up to 7.3.1. This affects an unknown part of the component CLI. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2025-25256. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
The threat actor known as EncryptHub is continuing to exploit a now-patched security flaw impacting Microsoft Windows to deliver malicious payloads.
Trustwave SpiderLabs said it recently observed an EncryptHub campaign that brings together social engineering and the exploitation of a vulnerability in the Microsoft Management Console (MMC) framework (CVE-2025-26633, aka MSC EvilTwin) to trigger