CVE List

Id CVE No. Status Description Phase Votes Comments Actions
58369  CVE-2012-5126  Candidate  Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of plug-in placeholders.  Assigned (20120924)  None (candidate not yet proposed)    View
58625  CVE-2012-5382  Candidate  ** DISPUTED ** Untrusted search path vulnerability in the installation functionality in Zend Server 5.6.0 SP4, when installed in the top-level C: directory, might allow local users to gain privileges via a Trojan horse DLL in the C:endendServershareendFrameworkin directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the choice of C: (and the resulting unsafe PATH) is established by an administrative action that is not a default part of the Zend Server installation.  Assigned (20121011)  None (candidate not yet proposed)    View
58881  CVE-2012-5638  Candidate  The setup_logging function in log.h in SANLock uses world-writable permissions for /var/log/sanlock.log, which allows local users to overwrite the file content or bypass intended disk-quota restrictions via standard filesystem write operations.  Assigned (20121024)  None (candidate not yet proposed)    View
59137  CVE-2012-5894  Candidate  SQL injection vulnerability in hava_post.php in Havalite CMS 1.1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the postId parameter.  Assigned (20121117)  None (candidate not yet proposed)    View
59393  CVE-2012-6150  Candidate  The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator"s pam_winbind configuration-file mistake.  Assigned (20121206)  None (candidate not yet proposed)    View

Page 157 of 20943, showing 5 records out of 104715 total, starting on record 781, ending on 785

Actions