A vulnerability was found in Mozilla Thunderbird up to 1.4 and classified as problematic. This issue affects some unknown processing. The manipulation leads to numeric error.
The identification of this vulnerability is CVE-2009-2535. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
This post first appeared on blog.netwrix.com and was written by Dirk Schrader. Many common password attack methods are quite straightforward — much like trying various physical keys to open the lock on a door. For example, in brute force attacks, adversaries systematically guess passwords until they find the correct one. Or instead of simply guessing, they can use a list of username/password combinations leaked from other breaches … Continued
A vulnerability was found in MikroTik RouterOS 5.15. It has been rated as critical. This issue affects some unknown processing in the library roteros.dll. The manipulation leads to configuration.
The identification of this vulnerability is CVE-2012-6050. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in VMware View up to 5.1.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Tunnel-Server. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2012-5978. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Cisco Prime Network Control System and classified as problematic. This vulnerability affects unknown code of the component Login Page. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2012-5990. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in FreeSSHD 1.2.1/1.2.2/1.2.6 on Windows. Affected is an unknown function of the file freeSSHd.exe of the component Authentication Handler. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2012-6066. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to disable the affected component.
A vulnerability has been found in Fedorahosted cronie 1.4.8 and classified as problematic. This vulnerability affects unknown code of the component crontab. The manipulation leads to information disclosure.
This vulnerability was named CVE-2012-6097. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Nagios Core 3.4.3. It has been rated as critical. This issue affects the function process_cgivars of the file history.cgi. The manipulation of the argument host_name/scv_description leads to memory corruption.
The identification of this vulnerability is CVE-2012-6096. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in fetchmail up to 5.9.7 and classified as critical. This vulnerability affects unknown code of the file socket.c. The manipulation leads to cryptographic issues.
This vulnerability was named CVE-2009-2666. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Sun JRE 5.0/6. Affected is an unknown function of the file XMLScanner.java. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2009-2625. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in VMware Player 2.5/2.5.1/2.5.2. It has been rated as very critical. Affected by this issue is some unknown functionality in the library vmnc.dll. The manipulation leads to code injection.
This vulnerability is handled as CVE-2009-2628. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Digium Asterisk up to 1.4.10. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2009-2346. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Infradead OpenConnect. Affected is an unknown function of the file http.c. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2012-6128. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Transmissionbt Transmission up to 2.72. This vulnerability affects unknown code of the file utp.cpp. The manipulation leads to memory corruption.
This vulnerability was named CVE-2012-6129. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Red Hat Enterprise Linux Server Aus 6.4. This vulnerability affects unknown code. The manipulation leads to credentials management.
This vulnerability was named CVE-2012-6137. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Citrix XenDesktop 5.6. It has been declared as problematic. This vulnerability affects unknown code of the component Virtual Desktop Agent. The manipulation leads to security check for standard.
This vulnerability was named CVE-2012-6314. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Splunk 5.0/5.0.1/5.0.2 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2012-6447. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Opera Web Browser up to 7.19. Affected by this issue is some unknown functionality. The manipulation leads to improper input validation.
This vulnerability is handled as CVE-2012-6461. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Fortinet FortiClient 3.0.614. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to format string.
This vulnerability is handled as CVE-2009-1262. The attack needs to be approached locally. There is no exploit available.