|Max CVSS||9.3||Min CVSS||2.6||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.
|30-10-2018 - 16:25||06-03-2007 - 20:19|
Mozilla Firefox before 220.127.116.11, Thunderbird before 18.104.22.168, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
|17-10-2018 - 21:31||29-07-2006 - 00:04|
Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an asser
|16-10-2018 - 16:45||23-05-2007 - 21:30|
Multiple unspecified vulnerabilities in Mozilla Firefox before 22.214.171.124 and SeaMonkey before 1.1.7 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger memory corruption.
|15-10-2018 - 21:47||26-11-2007 - 23:46|
Microsoft Internet Explorer 5.01, 5.5, and 6, when using an HTTPS proxy server that requires Basic Authentication, sends URLs in cleartext, which allows remote attackers to obtain sensitive information, aka "HTTPS Proxy Vulnerability."
|12-10-2018 - 21:37||14-12-2005 - 11:03|
Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets.
|11-10-2017 - 01:32||26-06-2007 - 00:30|
Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during
|11-10-2017 - 01:31||31-12-2006 - 05:00|
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
|11-10-2017 - 01:30||27-09-2005 - 20:03|
Firefox before 1.0 and Mozilla before 1.7.5 display the secure site lock icon when a view-source: URL references a secure SSL site while an insecure page is being loaded, which could facilitate phishing attacks.
|11-10-2017 - 01:29||02-05-2005 - 04:00|
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafte
|19-09-2017 - 01:29||03-11-2009 - 16:30|
The dbg_lvl file for the megaraid_sas driver in the Linux kernel before 2.6.27 has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file.
|19-09-2017 - 01:29||16-11-2009 - 19:30|