CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
14076 | CVE-2005-2870 | Candidate | Unknown vulnerability in the net-svc script on Solaris 10 allows remote authenticated users to execute arbitrary code on a DHCP client via certain DHCP responses. | Assigned (20050908) | None (candidate not yet proposed) | View | |
79612 | CVE-2015-2335 | Candidate | A JSON library in MyBB (aka MyBulletinBoard) before 1.8.4 allows remote attackers to obtain the installation path via unknown vectors. | Assigned (20150318) | None (candidate not yet proposed) | View | |
14332 | CVE-2005-3126 | Candidate | The (1) kantiword (kantiword.sh) and (2) gantiword (gantiword.sh) scripts in antiword 0.35 and earlier allow local users to overwrite arbitrary files via a symlink attack on temporary (a) output and (b) error files. | Assigned (20051003) | None (candidate not yet proposed) | View | |
79868 | CVE-2015-2591 | Candidate | Unspecified vulnerability in the PeopleSoft Enteprise Portal - Interaction Hub component in Oracle PeopleSoft Products 9.1.00 allows remote authenticated users to affect integrity via unknown vectors related to Enterprise Portal. | Assigned (20150320) | None (candidate not yet proposed) | View | |
14588 | CVE-2005-3382 | Candidate | Multiple interpretation error in Sophos 3.91 with the 2.28.4 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." | Assigned (20051029) | None (candidate not yet proposed) | View |
Page 20616 of 20943, showing 5 records out of 104715 total, starting on record 103076, ending on 103080