CVE List

Id CVE No. Status Description Phase Votes Comments Actions
69114  CVE-2014-1819  Candidate  win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly control access to objects associated with font files, which allows local users to gain privileges via a crafted file, aka "Font Double-Fetch Vulnerability."  Assigned (20140129)  None (candidate not yet proposed)    View
69370  CVE-2014-2075  Candidate  TIBCO Enterprise Administrator 1.0.0 and Enterprise Administrator SDK 1.0.0 do not properly enforce administrative authentication requirements, which allows remote attackers to execute arbitrary commands via unspecified vectors.  Assigned (20140219)  None (candidate not yet proposed)    View
4090  CVE-2001-1286  Candidate  Ipswitch IMail 7.04 and earlier stores a user"s session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker"s control.  Proposed (20020502)  ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Cole, Cox, Foat, Wall  Frech> XF:imail-mailbox-directory-traversal(7275)  View
69626  CVE-2014-2331  Candidate  Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.  Assigned (20140312)  None (candidate not yet proposed)    View
4346  CVE-2001-1546  Candidate  Pathways Homecare 6.5 uses weak encryption for user names and passwords, which allows local users to gain privileges by recovering the passwords from the pwhc.ini file.  Assigned (20050714)  None (candidate not yet proposed)    View

Page 20470 of 20943, showing 5 records out of 104715 total, starting on record 102346, ending on 102350

Actions