CVE List

Id CVE No. Status Description Phase Votes Comments Actions
22275  CVE-2006-6171  Candidate  ** DISPUTED ** ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability.  Assigned (20061130)  None (candidate not yet proposed)    View
87811  CVE-2016-10291  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20170328)  None (candidate not yet proposed)    View
22531  CVE-2006-6427  Candidate  The Web User Interface in Xerox WorkCentre and WorkCentre Pro before 12.060.17.000, 13.x before 13.060.17.000, and 14.x before 14.060.17.000 allows remote attackers to execute arbitrary commands via unspecified vectors involving "command injection" in (1) the TCP/IP hostname, (2) Scan-to-mailbox folder names, and (3) certain parameters in the Microsoft Networking configuration. NOTE: vector 1 might be the same as CVE-2006-5290.  Assigned (20061209)  None (candidate not yet proposed)    View
88067  CVE-2016-1248  Candidate  vim before patch 8.0.0056 does not properly validate values for the "filetype", "syntax" and "keymap" options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.  Assigned (20151227)  None (candidate not yet proposed)    View
22787  CVE-2006-6683  Candidate  Pedro Lineu Orso chetcpasswd 2.4.1 and earlier verifies and updates user accounts via custom code that processes /etc/shadow and does not follow the PAM configuration, which might allow remote attackers to bypass intended restrictions implemented through PAM.  Assigned (20061221)  None (candidate not yet proposed)    View

Page 277 of 20943, showing 5 records out of 104715 total, starting on record 1381, ending on 1385

Actions