CVE List

Id CVE No. Status Description Phase Votes Comments Actions
62967  CVE-2013-3020  Candidate  IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567.  Assigned (20130412)  None (candidate not yet proposed)    View
63223  CVE-2013-3276  Candidate  EMC RSA Archer GRC 5.x before 5.4 allows remote authenticated users to bypass intended access restrictions and complete a login by leveraging a deactivated account.  Assigned (20130426)  None (candidate not yet proposed)    View
63479  CVE-2013-3532  Candidate  SQL injection vulnerability in settings.php in the Web Dorado Spider Video Player plugin 2.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the theme parameter.  Assigned (20130510)  None (candidate not yet proposed)    View
63735  CVE-2013-3788  Candidate  Unspecified vulnerability in the Oracle iSupplier Portal component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Supplier Management.  Assigned (20130603)  None (candidate not yet proposed)    View
63991  CVE-2013-4044  Candidate  IBM SPSS Collaboration and Deployment Services 4.2.1 before 4.2.1.3 IF3 and 5.0 before FP3 allows remote authenticated users to read application log files via a direct HTTP request.  Assigned (20130607)  None (candidate not yet proposed)    View

Page 20300 of 20943, showing 5 records out of 104715 total, starting on record 101496, ending on 101500

Actions