CVE List

Id CVE No. Status Description Phase Votes Comments Actions
57857  CVE-2012-4614  Candidate  The default configuration of EMC Smarts Network Configuration Manager (NCM) before 9.1 does not require authentication for database access, which allows remote attackers to have an unspecified impact via a network session.  Assigned (20120824)  None (candidate not yet proposed)    View
58113  CVE-2012-4870  Candidate  Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) context parameter to panel/index_amp.php or (2) panel/dhtml/index.php; (3) clid or (4) clidname parameters to panel/flash/mypage.php; (5) PATH_INFO to admin/views/freepbx_reload.php; or (6) login parameter to recordings/index.php.  Assigned (20120906)  None (candidate not yet proposed)    View
58369  CVE-2012-5126  Candidate  Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of plug-in placeholders.  Assigned (20120924)  None (candidate not yet proposed)    View
58625  CVE-2012-5382  Candidate  ** DISPUTED ** Untrusted search path vulnerability in the installation functionality in Zend Server 5.6.0 SP4, when installed in the top-level C: directory, might allow local users to gain privileges via a Trojan horse DLL in the C:endendServershareendFrameworkin directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the choice of C: (and the resulting unsafe PATH) is established by an administrative action that is not a default part of the Zend Server installation.  Assigned (20121011)  None (candidate not yet proposed)    View
58881  CVE-2012-5638  Candidate  The setup_logging function in log.h in SANLock uses world-writable permissions for /var/log/sanlock.log, which allows local users to overwrite the file content or bypass intended disk-quota restrictions via standard filesystem write operations.  Assigned (20121024)  None (candidate not yet proposed)    View

Page 186 of 20943, showing 5 records out of 104715 total, starting on record 926, ending on 930

Actions