CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
62967 | CVE-2013-3020 | Candidate | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. | Assigned (20130412) | None (candidate not yet proposed) | View | |
63223 | CVE-2013-3276 | Candidate | EMC RSA Archer GRC 5.x before 5.4 allows remote authenticated users to bypass intended access restrictions and complete a login by leveraging a deactivated account. | Assigned (20130426) | None (candidate not yet proposed) | View | |
63479 | CVE-2013-3532 | Candidate | SQL injection vulnerability in settings.php in the Web Dorado Spider Video Player plugin 2.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the theme parameter. | Assigned (20130510) | None (candidate not yet proposed) | View | |
63735 | CVE-2013-3788 | Candidate | Unspecified vulnerability in the Oracle iSupplier Portal component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Supplier Management. | Assigned (20130603) | None (candidate not yet proposed) | View | |
63991 | CVE-2013-4044 | Candidate | IBM SPSS Collaboration and Deployment Services 4.2.1 before 4.2.1.3 IF3 and 5.0 before FP3 allows remote authenticated users to read application log files via a direct HTTP request. | Assigned (20130607) | None (candidate not yet proposed) | View |
Page 20300 of 20943, showing 5 records out of 104715 total, starting on record 101496, ending on 101500