Adobe Acrobat ReaderAdobe Acrobat and Reader Universal 3D Remote Code Execution Vulnerability

First published (updated )

Adobe Acrobat ReaderAdobe Acrobat and Reader Universal 3D Memory Corruption Vulnerability

First published (updated )

Digital UltrixBuffer Overflow

First published (updated )

Adobe Acrobat ReaderInteger Overflow

First published (updated )

Adobe Acrobat ReaderBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Adobe Acrobat ReaderXSS

First published (updated )

Adobe Acrobat ReaderCode Injection

First published (updated )

OpenAFSBuffer Overflow

First published (updated )

Adobe Acrobat ReaderUnspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windo…

First published (updated )

IBM DB2 Universal DatabaseIBM DB2 UDB 9.1 before Fixpak 4 uses incorrect permissions on ACLs for DB2NODES.CFG, which has unkno…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

IBM DB2 Universal DatabaseUnspecified vulnerability in (1) DB2WATCH and (2) DB2FREEZE in IBM DB2 UDB 9.1 before Fixpak 4 has u…

First published (updated )

IBM DB2 Universal DatabaseUnspecified vulnerability in the DB2DART tool in IBM DB2 UDB 9.1 before Fixpak 4 allows attackers to…

First published (updated )

IBM DB2 Universal DatabaseIBM DB2 UDB 9.1 before Fixpak 4 assigns incorrect privileges to the (1) DB2ADMNS and (2) DB2USERS al…

First published (updated )

IBM DB2 Universal DatabaseIBM DB2 UDB 9.1 before Fixpak 4 does not properly handle use of large numbers of file descriptors, w…

First published (updated )

Mozilla FirefoxDirectory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

IBM DB2 Universal DatabaseIBM DB2 UDB 9.1 before Fixpak 4 does not properly perform vector aggregation, which might allow atta…

7.8
First published (updated )

Adobe Acrobat ReaderUntrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux …

7.5
First published (updated )

UNIXxterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a …

7.2
First published (updated )

cde cdeThe dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges.

7.2
First published (updated )

IBM DB2 Universal DatabaseUnspecified vulnerability in DB2LICD in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attac…

7.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

IBM DB2 Universal DatabaseUnspecified vulnerability in the SSL LOAD GSKIT action in IBM DB2 UDB 9.1 before Fixpak 4 has unknow…

7.2
First published (updated )

IBM DB2 Universal DatabaseUnspecified vulnerability in unspecified setuid programs in IBM DB2 UDB 9.1 before Fixpak 4 allows l…

7.2
First published (updated )

InterSect Alliance Snare AgentCSRF

First published (updated )

Adobe Acrobat ReaderBuffer Overflow

First published (updated )

NetBSD NetBSDtraceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing …

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Debian Debian Linuxtraceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source ad…

First published (updated )

FreeBSD FreeBSDICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denia…

First published (updated )

UNIX UNIXProcess table attack in Unix systems allows a remote attacker to perform a denial of service by fill…

First published (updated )

Petitforum PetitforumPetitforum stores the liste.txt data file under the web document root with insufficient access contr…

First published (updated )

Mike Bobbitt Album.plInput Validation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203