CVE List

Id CVE No. Status Description Phase Votes Comments Actions
64771  CVE-2013-4824  Candidate  Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to bypass authentication via unknown vectors, aka ZDI-CAN-1644.  Assigned (20130712)  None (candidate not yet proposed)    View
65027  CVE-2013-5080  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20130806)  None (candidate not yet proposed)    View
65283  CVE-2013-5336  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20130820)  None (candidate not yet proposed)    View
CVE-1999-0004  Candidate  MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook.  Modified (19990621-01)  ACCEPT(8) Baker, Cole, Collins, Dik, Landfield, Magdych, Northcutt, Wall | MODIFY(1) Frech | NOOP(1) Christey | REVIEWING(1) Shostack  Frech> Extremely minor, but I believe e-mail is the correct term. (If you reject | this suggestion, I will not be devastated.) :-) | Christey> This issue seems to have been rediscovered in | BUGTRAQ:20000515 Eudora Pro & Outlook Overflow - too long filenames again | http://marc.theaimsgroup.com/?l=bugtraq&m=95842482413076&w=2 | | Also see | BUGTRAQ:19990320 Eudora Attachment Buffer Overflow | http://marc.theaimsgroup.com/?l=bugtraq&m=92195396912110&w=2 | Christey> | CVE-2000-0415 may be a later rediscovery of this problem | for Outlook. | Dik> Sun bug 4163471, | Christey> ADDREF BID:125 | Christey> BUGTRAQ:19980730 Long Filenames & Lotus Products | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=90221104526201&w=2  View
65540  CVE-2013-5593  Candidate  The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.  Assigned (20130826)  None (candidate not yet proposed)    View

Page 930 of 20943, showing 5 records out of 104715 total, starting on record 4646, ending on 4650

Actions