Show filters
55 Total Results
Displaying 51-55 of 55
Sort by:
Attacker Value
Unknown

CVE-2013-4804

Disclosure Date: October 13, 2013 (last updated October 05, 2023)
Unspecified vulnerability in HP Business Process Monitor 9.13.1 patch 1 and 9.22 patch 1 allows remote attackers to execute arbitrary code and obtain sensitive information via unknown vectors.
0
Attacker Value
Unknown

CVE-2011-3330

Disclosure Date: November 04, 2011 (last updated October 04, 2023)
Buffer overflow in the UnitelWay Windows Device Driver, as used in Schneider Electric Unity Pro 6 and earlier, OPC Factory Server 3.34, Vijeo Citect 7.20 and earlier, Telemecanique Driver Pack 2.6 and earlier, Monitor Pro 7.6 and earlier, and PL7 Pro 4.5 and earlier, allows local users, and possibly remote attackers, to execute arbitrary code via an unspecified system parameter.
0
Attacker Value
Unknown

CVE-2009-1161

Disclosure Date: May 21, 2009 (last updated October 04, 2023)
Directory traversal vulnerability in the TFTP service in Cisco CiscoWorks Common Services (CWCS) 3.0.x through 3.2.x on Windows, as used in Cisco Unified Service Monitor, Security Manager, TelePresence Readiness Assessment Manager, Unified Operations Manager, Unified Provisioning Manager, and other products, allows remote attackers to access arbitrary files via unspecified vectors.
0
Attacker Value
Unknown

CVE-2007-4969

Disclosure Date: September 19, 2007 (last updated October 04, 2023)
Process Monitor 1.22 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via unspecified kernel SSDT hooks for Windows Native API functions including (1) NtCreateKey, (2) NtDeleteValueKey, (3) NtLoadKey, (4) NtOpenKey, (5) NtQueryValueKey, (6) NtSetValueKey, and (7) NtUnloadKey.
0
Attacker Value
Unknown

CVE-2005-3653

Disclosure Date: December 31, 2005 (last updated February 22, 2025)
Heap-based buffer overflow in the iGateway service for various Computer Associates (CA) iTechnology products, in iTechnology iGateway before 4.0.051230, allows remote attackers to execute arbitrary code via an HTTP request with a negative Content-Length field.
0