Vulnerability & Exploit Database

Displaying entries 1 - 10 of 19 in total

Results for: CVE-2010-2901 Back to search

Sun Patch: SunOS 5.10_x86: Oracle Java Web Console 3.1 Patch Vulnerability

  • Severity: 8
  • Published: February 06, 2012

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Sun Patch: SunOS 5.10: Oracle Java Web Console 3.1 Patch Vulnerability

  • Severity: 8
  • Published: February 06, 2012

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

USN-1195-1: WebKit vulnerabilities Vulnerability

  • Severity: 10
  • Published: December 21, 2010

Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 do not properly perform cursor handling, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale pointers."

SUSE Linux Security Advisory: SUSE-SR:2011:009 Vulnerability

  • Severity: 10
  • Published: December 21, 2010

Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 do not properly perform cursor handling, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale pointers."

FreeBSD: webkit-gtk2 -- Multiple vurnabilities. (Multiple CVEs) Vulnerability

  • Severity: 10
  • Published: December 21, 2010

Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 do not properly perform cursor handling, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale pointers."

SUSE Linux Security Vulnerability: CVE-2010-2901 Vulnerability

  • Severity: 10
  • Published: July 28, 2010

The rendering implementation in Google Chrome before 5.0.375.125 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

Google Chrome Vulnerability: CVE-2010-2901 Vulnerability

  • Severity: 10
  • Published: July 28, 2010

The rendering implementation in Google Chrome before 5.0.375.125 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

Sun Patch: SunOS 5.9_x86: tomcat security patch Vulnerability

  • Severity: 8
  • Published: July 13, 2010

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Sun Patch: SunOS 5.9: tomcat security patch Vulnerability

  • Severity: 8
  • Published: July 13, 2010

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.