CVE List

Id CVE No. Status Description Phase Votes Comments Actions
68858  CVE-2014-1563  Candidate  Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection.  Assigned (20140116)  None (candidate not yet proposed)    View
69114  CVE-2014-1819  Candidate  win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly control access to objects associated with font files, which allows local users to gain privileges via a crafted file, aka "Font Double-Fetch Vulnerability."  Assigned (20140129)  None (candidate not yet proposed)    View
69370  CVE-2014-2075  Candidate  TIBCO Enterprise Administrator 1.0.0 and Enterprise Administrator SDK 1.0.0 do not properly enforce administrative authentication requirements, which allows remote attackers to execute arbitrary commands via unspecified vectors.  Assigned (20140219)  None (candidate not yet proposed)    View
69626  CVE-2014-2331  Candidate  Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.  Assigned (20140312)  None (candidate not yet proposed)    View
4346  CVE-2001-1546  Candidate  Pathways Homecare 6.5 uses weak encryption for user names and passwords, which allows local users to gain privileges by recovering the passwords from the pwhc.ini file.  Assigned (20050714)  None (candidate not yet proposed)    View

Page 20448 of 20943, showing 5 records out of 104715 total, starting on record 102236, ending on 102240

Actions