Vulnerability & Exploit Database

Displaying entries 1 - 10 of 17 in total

Results for: CVE-2007-0510 Back to search

Sun Patch: SunOS 5.10: Adobe Acrobat Reader patch Vulnerability

  • Severity: 10
  • Published: April 30, 2009

Heap-based buffer overflow in Adobe Acrobat Reader and Acrobat Professional 7.1.0, 8.1.3, 9.0.0, and other versions allows remote attackers to execute arbitrary code via a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table.

SUSE Linux Security Advisory: SUSE-SR:2008:017 Vulnerability

  • Severity: 10
  • Published: September 02, 2008

Multiple buffer overflows in packet_ncp2222.inc in Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted NCP packet that causes an invalid pointer to be used.

SUSE Linux Security Advisory: SUSE-SA:2008:041 Vulnerability

  • Severity: 9
  • Published: May 12, 2008

Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow. NOTE: the role of the channel_process function was not specified by the original researcher.

RHSA-2008:0505: Red Hat Application Stack v2.1 security and enhancement update Vulnerability

  • Severity: 10
  • Published: May 05, 2008

Red Hat Application Stack v2.1 is now available. This update fixes various security issues and adds several enhancements. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The Red Hat Application Stack is an integrated open source application stack, and includes JBoss Enter...

SUSE-SR:2007:014:vuln6: evolution IMAP SEQUENCE buffer overflow Vulnerability

  • Severity: 7
  • Published: July 20, 2007

Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.

SUSE-SA:2007:042: Evolution Vulnerability

  • Severity: 7
  • Published: July 05, 2007

Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.

USN-475-1: evolution-data-server vulnerability Vulnerability

  • Severity: 7
  • Published: June 19, 2007

Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.

SUSE Linux Security Advisory: SUSE-SA:2007:042 Vulnerability

  • Severity: 7
  • Published: June 19, 2007

Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.

SUSE Linux Security Vulnerability: CVE-2007-3257 Vulnerability

  • Severity: 7
  • Published: June 19, 2007

Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.

RHSA-2007:0510: evolution-data-server security update Vulnerability

  • Severity: 7
  • Published: June 19, 2007

Updated evolution-data-server package that fixes a security bug are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team.

The evolution-data-server package provides a unified backend for programs that work with contacts, tasks, and...