CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
44091 | CVE-2010-1507 | Candidate | WebYaST in yast2-webclient in SUSE Linux Enterprise (SLE) 11 on the WebYaST appliance uses a fixed secret key that is embedded in the appliance"s image, which allows remote attackers to spoof session cookies by leveraging knowledge of this key. | Assigned (20100426) | None (candidate not yet proposed) | View | |
63656 | CVE-2013-3709 | Candidate | WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file. | Assigned (20130530) | None (candidate not yet proposed) | View | |
4332 | CVE-2001-1532 | Candidate | WebX stores authentication information in the HTTP_REFERER variable, which is included in URL links within bulletin board messages posted by users, which could allow remote attackers to hijack user sessions. | Assigned (20050714) | None (candidate not yet proposed) | View | |
1588 | CVE-2000-0010 | Entry | WebWho+ whois.cgi program allows remote attackers to execute commands via shell metacharacters in the TLD parameter. | View | |||
11522 | CVE-2005-0316 | Candidate | WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions. | Assigned (20050210) | None (candidate not yet proposed) | View |
Page 228 of 20943, showing 5 records out of 104715 total, starting on record 1136, ending on 1140