|
291411
|
- |
|
ibm
|
websphere_application_server
|
Cross-site request forgery (CSRF) vulnerability in IBM WebSphere Application Server 6.1 before 6.1.0.45, 7.0 before 7.0.0.25, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1 allows remote attackers to hij…
|
CWE-352
Origin Validation Error
|
CVE-2012-4853
|
2024-11-21 10:43 |
2012-11-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291412
|
- |
|
ibm
|
websphere_application_server
|
Cross-site scripting (XSS) vulnerability in IBM WebSphere Application Server 8.5 Liberty Profile before 8.5.0.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URI.
|
CWE-79
Cross-site Scripting
|
CVE-2012-4851
|
2024-11-21 10:43 |
2012-11-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291413
|
- |
|
ibm
|
websphere_application_server
|
IBM WebSphere Application Server 8.5 Liberty Profile before 8.5.0.1, when JAX-RS is used, does not properly validate requests, which allows remote attackers to gain privileges via unspecified vectors.
|
CWE-20
Improper Input Validation
|
CVE-2012-4850
|
2024-11-21 10:43 |
2012-11-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291414
|
- |
|
ibm
|
cognos_business_intelligence
|
IBM Cognos Business Intelligence (BI) 8.4 and 8.4.1 allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted request containing a zero-valued byte.
|
CWE-189
Numeric Errors
|
CVE-2012-4847
|
2024-11-21 10:43 |
2012-11-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291415
|
- |
|
microsoft
|
.net_framework
|
The code-optimization feature in the reflection implementation in Microsoft .NET Framework 4 and 4.5 does not properly enforce object permissions, which allows remote attackers to execute arbitrary c…
|
CWE-264
Permissions, Privileges, and Access Controls
|
CVE-2012-4777
|
2024-11-21 10:43 |
2012-11-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291416
|
- |
|
microsoft
|
.net_framework
|
The Web Proxy Auto-Discovery (WPAD) functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not validate configuration data that is returned during acquisition of proxy setting…
|
CWE-20
Improper Input Validation
|
CVE-2012-4776
|
2024-11-21 10:43 |
2012-11-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291417
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site, aka "CTreeNode Use After Free Vulnerability."
|
CWE-399
Resource Management Errors
|
CVE-2012-4775
|
2024-11-21 10:43 |
2012-11-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291418
|
- |
|
bestpractical
|
rt
|
Argument injection vulnerability in Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote attackers to create arbitrary files via unspecified vectors related to the GnuPG clie…
|
CWE-94
Code Injection
|
CVE-2012-4884
|
2024-11-21 10:43 |
2012-11-11 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291419
|
- |
|
bestpractical
|
rt
|
Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote attackers to conduct a "confused deputy" attack to bypass the CSRF warning protection mechanism and cause victims to "mod…
|
CWE-264
Permissions, Privileges, and Access Controls
|
CVE-2012-4734
|
2024-11-21 10:43 |
2012-11-11 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291420
|
- |
|
bestpractical
|
rt
|
Cross-site request forgery (CSRF) vulnerability in Request Tracker (RT) 3.8.12 and other versions before 3.8.15, and 4.0.6 and other versions before 4.0.8, allows remote attackers to hijack the authe…
|
CWE-352
Origin Validation Error
|
CVE-2012-4732
|
2024-11-21 10:43 |
2012-11-11 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|