CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
14072 | CVE-2005-2866 | Candidate | Mercora IMRadio 4.0.0.0 stores usernames and passwords in plaintext in the MercoraClientProfiles registry key, which allows local users to gain privileges. | Assigned (20050908) | None (candidate not yet proposed) | View | |
79608 | CVE-2015-2331 | Candidate | Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow. | Assigned (20150318) | None (candidate not yet proposed) | View | |
14328 | CVE-2005-3122 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3424, CVE-2005-3425. Reason: this candidate was intended for one issue, but two different authoritative sources used it for two distinct issues. Notes: All CVE users should consult CVE-2005-3424 and CVE-2005-3425 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage. | Assigned (20051003) | None (candidate not yet proposed) | View | |
79864 | CVE-2015-2587 | Candidate | Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1, 8.2.2, and 15.0 allows remote attackers to affect integrity via vectors related to SWSE Server Infrastructure. | Assigned (20150320) | None (candidate not yet proposed) | View | |
14584 | CVE-2005-3378 | Candidate | Multiple interpretation error in Norman 5.81 with the 5.83.02 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." | Assigned (20051029) | None (candidate not yet proposed) | View |
Page 20308 of 20943, showing 5 records out of 104715 total, starting on record 101536, ending on 101540