|
300241
|
- |
|
oracle
|
jd_edwards_enterpriseone_tools jd_edwards_products
|
Unspecified vulnerability in the EnterpriseOne Tools component in Oracle JD Edwards 8.98 SP 24 allows remote authenticated users to affect integrity, related to Enterprise Infrastucture SEC (JDNET).
|
NVD-CWE-noinfo
|
CVE-2011-2317
|
2024-11-21 10:28 |
2012-01-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
300242
|
- |
|
robert_luberda
|
super
|
Buffer overflow in the Error function in super.c in Super 3.30.0 might allow local users to execute arbitrary code via vectors related to syslog logging. NOTE: some of these details are obtained fro…
|
CWE-119
Incorrect Access of Indexable Resource ('Range Error')
|
CVE-2011-2776
|
2024-11-21 10:28 |
2012-01-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
300243
|
- |
|
tor
|
tor
|
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS conn…
|
CWE-119
Incorrect Access of Indexable Resource ('Range Error')
|
CVE-2011-2778
|
2024-11-21 10:28 |
2011-12-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
300244
|
- |
|
tor
|
tor
|
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enu…
|
CWE-200
Information Exposure
|
CVE-2011-2769
|
2024-11-21 10:28 |
2011-12-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
300245
|
- |
|
tor
|
tor
|
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by r…
|
CWE-264
Permissions, Privileges, and Access Controls
|
CVE-2011-2768
|
2024-11-21 10:28 |
2011-12-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
300246
|
- |
|
emc
|
rsa_adaptive_authentication_on-premise
|
EMC RSA Adaptive Authentication On-Premise (AAOP) 6.0.2.1 SP1 Patch 2, SP1 Patch 3, SP2, SP2 Patch 1, and SP3 does not properly perform forensic evaluation upon receipt of device tokens from mobile a…
|
CWE-264
Permissions, Privileges, and Access Controls
|
CVE-2011-2742
|
2024-11-21 10:28 |
2011-12-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
300247
|
- |
|
emc
|
rsa_adaptive_authentication_on-premise
|
EMC RSA Adaptive Authentication On-Premise (AAOP) 6.0.2.1 SP1 Patch 2, SP1 Patch 3, SP2, SP2 Patch 1, and SP3 does not properly implement Device Recovery and Device Identification, which might allow …
|
CWE-264
Permissions, Privileges, and Access Controls
|
CVE-2011-2741
|
2024-11-21 10:28 |
2011-12-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
300248
|
- |
|
adobe
|
coldfusion
|
Cross-site scripting (XSS) vulnerability in Adobe ColdFusion 8.0 through 9.0.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving the cfform tag.
|
CWE-79
Cross-site Scripting
|
CVE-2011-2463
|
2024-11-21 10:28 |
2011-12-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
300249
|
- |
|
novell
|
zenworks_asset_management
|
Directory traversal vulnerability in the rtrlet component in Novell ZENworks Asset Management (ZAM) 7.5 allows remote attackers to execute arbitrary code by uploading an executable file.
|
CWE-22
Path Traversal
|
CVE-2011-2653
|
2024-11-21 10:28 |
2011-12-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
300250
|
- |
|
ironmountain
|
connected_backup
|
The Agent service in Iron Mountain Connected Backup 8.4 allows remote attackers to execute arbitrary code via a crafted opcode 13 request that triggers use of the LaunchCompoundFileAnalyzer class to …
|
CWE-20
Improper Input Validation
|
CVE-2011-2397
|
2024-11-21 10:28 |
2011-12-5 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|