CVE List

Id CVE No. Status Description Phase Votes Comments Actions
70889  CVE-2014-3593  Candidate  Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration.  Assigned (20140514)  None (candidate not yet proposed)    View
71145  CVE-2014-3849  Candidate  The iMember360 plugin 3.8.012 through 3.9.001 for WordPress does not properly restrict access, which allows remote attackers to delete arbitrary users via a request containing a user name in the Email parameter and the API key in the i4w_clearuser parameter.  Assigned (20140523)  None (candidate not yet proposed)    View
71401  CVE-2014-4105  Candidate  Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2799, CVE-2014-4059, CVE-2014-4065, CVE-2014-4079, CVE-2014-4081, CVE-2014-4083, CVE-2014-4085, CVE-2014-4088, CVE-2014-4090, CVE-2014-4094, CVE-2014-4097, CVE-2014-4100, CVE-2014-4103, CVE-2014-4104, CVE-2014-4106, CVE-2014-4107, CVE-2014-4108, CVE-2014-4109, CVE-2014-4110, and CVE-2014-4111.  Assigned (20140612)  None (candidate not yet proposed)    View
6121  CVE-2002-1739  Candidate  Alt-N Technologies Mdaemon 5.0 through 5.0.6 uses a weak encryption algorithm to store user passwords, which allows local users to crack passwords.  Assigned (20050621)  None (candidate not yet proposed)    View
71657  CVE-2014-4361  Candidate  The Home & Lock Screen subsystem in Apple iOS before 8 does not properly restrict the private API for app prominence, which allows attackers to determine the frontmost app by leveraging access to a crafted background app.  Assigned (20140620)  None (candidate not yet proposed)    View

Page 19138 of 20943, showing 5 records out of 104715 total, starting on record 95686, ending on 95690

Actions