A Java Web Start vulnerability exists in Oracle Java. The vulnerability can be exploited by remote unauthenticated attackers to execute arbitrary code on a vulnerable system.
a9f20f8af75e64dcb02cb2bdaa029132cb9ba5d1cd5919657bca7c33647845c5
A buffer overflow vulnerability exists in Novell ZENworks Handheld Management that could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges on a vulnerable server. Novell ZENworks Handheld Management version 7.0 is affected.
bfcd353dc2accabbc9d539a588cf3605dd7c032822d98271bab9b7ff7fb33027
An arbitrary program execution vulnerability exists in Symantec Alert Management System (AMS) service shipped with multiple Symantec products. The vulnerability could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges.
eee2169d996a231a38ee1755b3896a7774d1175ed44b33559666eb32ec79256f
A denial of service vulnerability exists in Symantec Antivirus Intel Alert Handler service. Remote unauthenticated attackers can exploit this vulnerability by sending a malicious packet to the target service.
9e9991cc21baae425527d30468a81b8551b7dcfe14ef58362a4b2b29ec346383
A memory corruption vulnerability exists in Adobe Shockwave Player while parsing crafted Adobe Director files (.dir or .dcr), that may lead to arbitrary code execution. The vulnerability is due to insufficient validation of certain fields while parsing 'pamm' chunk data. An attacker can leverage this vulnerability to write data to an attacker-controlled memory location. Successful exploitation could allow for the execution of arbitrary code within the security context of a target user. Adobe Shockwave Player versions 11.5.8.612 and 11.5.7.609 are affected.
52321373bf2a0653fb086d290321ba798dc5e0c8bffe3c1b5a613be0afe0213f
A stack buffer overflow vulnerability exist in iscsitarget, an open implementation of iSCSI Enterprise Target. The vulnerability is caused by insufficient boundary checking while processing iSNS messages. A remote attacker can leverage this vulnerability to inject and execute arbitrary code on a vulnerable system.
6fcd69274daa390cb09aab03d6ff81c49f17f973d50117e842e0491b410fefbd
A remotely exploitable vulnerability has been discovered in Adobe Acrobat Reader for Linux. Specifically, the vulnerability is due to an integer overflow when processing the "Shading Count" field in the CLOD Mesh Declaration block, which may lead to a heap based buffer overflow and execution of arbitrary code. Adobe Systems Acrobat Reader versions 8.1.6, 9.2 and 9.3 for Linux are all affected.
f385ef95e1573ac6a4f3c822fd3e9df546151e7422ff23e8cba084c3366032a6
A remotely exploitable vulnerability has been discovered in multiple ACDSee Systems products. Specifically, the vulnerability is due to a boundary errorwhen processing XBM image files and can lead to a buffer overflow condition. This boundary error can allow attackers to inject and execute arbitrary code on the target host with the privileges of the logged-on user.
8aaace2e9bab5ab6a9e82b4fcf0560c7187f33c5aaa7c2f48503f4c3e335d130