CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
31491 | CVE-2008-1374 | Candidate | Integer overflow in pdftops filter in CUPS in Red Hat Enterprise Linux 3 and 4, when running on 64-bit platforms, allows remote attackers to execute arbitrary code via a crafted PDF file. NOTE: this issue is due to an incomplete fix for CVE-2004-0888. | Assigned (20080318) | None (candidate not yet proposed) | View | |
97027 | CVE-2017-0208 | Candidate | An information disclosure vulnerability exists in Microsoft Edge when the Chakra scripting engine does not properly handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user"s system, a.k.a. "Scripting Engine Information Disclosure Vulnerability." | Assigned (20160909) | None (candidate not yet proposed) | View | |
31747 | CVE-2008-1630 | Candidate | Multiple cross-site scripting (XSS) vulnerabilities in CuteFlow 1.5.0 and 2.10.0 allow remote attackers to inject arbitrary web script or HTML via the language parameter to (1) page/showcirculation.php; and (2) edittemplate_step2.php, (3) showfields.php, (4) showuser.php, (5) editmailinglist_step1.php, and (6) showtemplates.php in pages/. | Assigned (20080402) | None (candidate not yet proposed) | View | |
97283 | CVE-2017-0464 | Candidate | An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32940193. References: QC-CR#1102593. | Assigned (20161129) | None (candidate not yet proposed) | View | |
32003 | CVE-2008-1886 | Candidate | The NeffyLauncher 1.0.5 ActiveX control (NeffyLauncher.dll) in CDNetworks Nefficient Download uses weak cryptography for a KeyCode that blocks unauthorized use of the control, which allows remote attackers to bypass this protection mechanism by calculating the required KeyCode. NOTE: this can be used by arbitrary web sites to host exploit code that targets this control. | Assigned (20080418) | None (candidate not yet proposed) | View |
Page 314 of 20943, showing 5 records out of 104715 total, starting on record 1566, ending on 1570