Vulnerabilities > Critical

DATE CVE VULNERABILITY TITLE RISK
2012-10-08 CVE-2012-1189 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Stack-based buffer overflow in modules/graphic/ssgraph/grsound.cpp in The Open Racing Car Simulator (TORCS) before 1.3.3 and Speed Dreams allows user-assisted remote attackers to execute arbitrary code via a long file name in an engine sample attribute in an xml configuration file.
9.3
2012-10-05 CVE-2012-4896 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Sumatrapdfreader Sumatrapdf
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895.
network
sumatrapdfreader CWE-119
critical
9.3
2012-10-05 CVE-2012-4895 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Sumatrapdfreader Sumatrapdf
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896.
network
sumatrapdfreader CWE-119
critical
9.3
2012-10-05 CVE-2012-4894 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Sketchup
Google SketchUp before 8.0.14346 (aka 8 Maintenance 3) allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted SKP file.
network
google CWE-119
critical
9.3
2012-09-28 CVE-2012-5197 Unspecified vulnerability in Condor Project Condor
Multiple unspecified vulnerabilities in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 have unknown impact and attack vectors related to "error checking of system calls."
network
low complexity
condor-project
critical
10.0
2012-09-28 CVE-2012-5196 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Condor Project Condor
Multiple buffer overflows in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 have unknown impact and attack vectors.
network
low complexity
condor-project CWE-119
critical
10.0
2012-09-28 CVE-2012-0418 Remote Code Execution vulnerability in Novell Groupwise Client
Unspecified vulnerability in the client in Novell GroupWise 8.0 before Support Pack 3 and 2012 before Support Pack 1 on Windows allows user-assisted remote attackers to execute arbitrary code via a crafted file.
network
novell microsoft
critical
9.3
2012-09-28 CVE-2012-0417 Numeric Errors vulnerability in Novell Groupwise
Integer overflow in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before Support Pack 3 and 2012 before Support Pack 1 allows remote attackers to execute arbitrary code via unspecified vectors.
network
low complexity
novell CWE-189
critical
10.0
2012-09-25 CVE-2012-3334 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in IBM Informix Dynamic Server
Stack-based buffer overflow in IBM Informix Dynamic Server (IDS) 11.50 before 11.50.xC9W2 and 11.70 before 11.70.xC5 allows remote authenticated users to execute arbitrary code via crafted arguments in a SET COLLATION statement.
network
low complexity
ibm CWE-119
critical
9.0
2012-09-25 CVE-2012-3324 Path Traversal vulnerability in IBM DB2 and DB2 Connect
Directory traversal vulnerability in the UTL_FILE module in IBM DB2 and DB2 Connect 10.1 before FP1 on Windows allows remote authenticated users to modify, delete, or read arbitrary files via a pathname in the file field.
network
low complexity
ibm microsoft CWE-22
critical
9.0