CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
76787 | CVE-2014-9486 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9447. Reason: This candidate is a duplicate of CVE-2014-9447. Notes: All CVE users should reference CVE-2014-9447 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | Assigned (20150103) | None (candidate not yet proposed) | View | |
11507 | CVE-2005-0301 | Candidate | comersus_backoffice_install10.asp in BackOffice Lite 6.0 and 6.01 allows remote attackers to bypass authentication and gain privileges via a direct request to the program. | Assigned (20050210) | None (candidate not yet proposed) | View | |
77043 | CVE-2014-9742 | Candidate | The Miller-Rabin primality check in Botan before 1.10.8 and 1.11.x before 1.11.9 improperly uses a single random base, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a DH group. | Assigned (20150804) | None (candidate not yet proposed) | View | |
11763 | CVE-2005-0557 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20050226) | None (candidate not yet proposed) | View | |
77299 | CVE-2015-0036 | Candidate | Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0020, CVE-2015-0022, CVE-2015-0026, CVE-2015-0030, CVE-2015-0031, and CVE-2015-0041. | Assigned (20141118) | None (candidate not yet proposed) | View |
Page 19918 of 20943, showing 5 records out of 104715 total, starting on record 99586, ending on 99590