CVE List

Id CVE No. Status Description Phase Votes Comments Actions
71429  CVE-2014-4133  Candidate  Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4137.  Assigned (20140612)  None (candidate not yet proposed)    View
6149  CVE-2002-1767  Candidate  Buffer overflow in tnslsnr of Oracle 8i Database Server 8.1.5 for Linux allows local users to execute arbitrary code as the oracle user via a long command line argument.  Assigned (20050621)  None (candidate not yet proposed)    View
71685  CVE-2014-4389  Candidate  Integer overflow in IOKit in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context via an application that provides crafted API arguments.  Assigned (20140620)  None (candidate not yet proposed)    View
6405  CVE-2002-2023  Candidate  The get_parameter_from_freqency_source function in beep2 1.0, 1.1 and 1.2, when installed setuid root, allows local users to read arbitrary files via unknown attack vectors.  Assigned (20050714)  None (candidate not yet proposed)    View
71941  CVE-2014-4644  Candidate  SQL injection vulnerability in superlinks.php in the superlinks plugin 1.4-2 for Cacti allows remote attackers to execute arbitrary SQL commands via the id parameter.  Assigned (20140625)  None (candidate not yet proposed)    View

Page 429 of 20943, showing 5 records out of 104715 total, starting on record 2141, ending on 2145

Actions