CVE List

Id CVE No. Status Description Phase Votes Comments Actions
74485  CVE-2014-7185  Candidate  Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.  Assigned (20140925)  None (candidate not yet proposed)    View
9205  CVE-2004-0777  Candidate  Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code.  Assigned (20040811)  None (candidate not yet proposed)    View
74741  CVE-2014-7440  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20141003)  None (candidate not yet proposed)    View
9461  CVE-2004-1033  Candidate  Fcron 2.0.1, 2.9.4, and possibly earlier versions leak file descriptors of open files, which allows local users to bypass access restrictions and read fcron.allow and fcron.deny via the EDITOR environment variable.  Assigned (20041112)  None (candidate not yet proposed)    View
74997  CVE-2014-7696  Candidate  The Halftime Magazine (aka com.magzter.halftimemagazine) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.  Assigned (20141003)  None (candidate not yet proposed)    View

Page 20074 of 20943, showing 5 records out of 104715 total, starting on record 100366, ending on 100370

Actions