CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
81391 | CVE-2015-4114 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20150528) | None (candidate not yet proposed) | View | |
16111 | CVE-2006-0007 | Candidate | Buffer overflow in GIFIMP32.FLT, as used in Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, and other products, allows user-assisted attackers to execute arbitrary code via a crafted GIF image that triggers memory corruption when it is parsed. | Assigned (20051109) | None (candidate not yet proposed) | View | |
81647 | CVE-2015-4370 | Candidate | Cross-site scripting (XSS) vulnerability in the Site Documentation module before 6.x-1.5 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to taxonomy terms. | Assigned (20150605) | None (candidate not yet proposed) | View | |
16367 | CVE-2006-0263 | Candidate | Multiple unspecified vulnerabilities in Oracle Database server 8.1.7.4, 9.0.1.5, 9.0.1.5 FIPS, 9.2.0.7, 10.1.0.5, and 10.2.0.1 have unspecified impact and attack vectors, as identified by Oracle Vuln# (1) DB09 in the (a) Net Listener component; and (2) DB12 and (3) DB13 in the Network Communications (RPC) component. | Assigned (20060118) | None (candidate not yet proposed) | View | |
81903 | CVE-2015-4626 | Candidate | B.A.S C2Box before 4.0.0 (r19171) relies on client-side validation, which allows remote attackers to "corrupt the business logic" via a negative value in an overdraft. | Assigned (20150616) | None (candidate not yet proposed) | View |
Page 19614 of 20943, showing 5 records out of 104715 total, starting on record 98066, ending on 98070