CVE List

Id CVE No. Status Description Phase Votes Comments Actions
75755  CVE-2014-8454  Candidate  Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8455 and CVE-2014-9165.  Assigned (20141022)  None (candidate not yet proposed)    View
10475  CVE-2004-2049  Candidate  eSeSIX Thintune thin clients running firmware 2.4.38 and earlier store sensitive usernames and passwords in cleartext in configuration files for the keeper library, which allows attackers to gain access.  Assigned (20050504)  None (candidate not yet proposed)    View
76011  CVE-2014-8710  Candidate  The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.  Assigned (20141109)  None (candidate not yet proposed)    View
10731  CVE-2004-2305  Candidate  Computer Associates eTrust Antivirus EE 6.0 through 7.0 allows remote attackers to bypass virus scanning by including a password-protected file in a ZIP file, which causes eTrust to scan only the password protected file and skip the other files.  Assigned (20050816)  None (candidate not yet proposed)    View
76267  CVE-2014-8966  Candidate  Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."  Assigned (20141118)  None (candidate not yet proposed)    View

Page 19287 of 20943, showing 5 records out of 104715 total, starting on record 96431, ending on 96435

Actions