NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
64543 | CVE-2006-5968 | MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemonAPP folder, which is an untrusted search path element due to insecure permissions. | 2 | 4.6 | Medium | 2016-12-20 | 2011-03-07 | View | |
64799 | CVE-2006-6238 | The AutoFill feature in Apple Safari 2.0.4 does not properly verify that all automatically populated form fields are visible to the user, which allows remote attackers to obtain sensitive information, such as usernames and passwords, via input fields of zero width, a variant of CVE-2006-6077. | 2 | 5 | Medium | 2016-12-20 | 2008-09-05 | View | |
288 | CVE-2008-0303 | The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce. | 2 | 6.4 | Medium | 2017-01-03 | 2009-03-13 | View | |
65824 | CVE-2005-0039 | Certain configurations of IPsec, when using Encapsulating Security Payload (ESP) in tunnel mode, integrity protection at a higher layer, or Authentication Header (AH), allow remote attackers to decrypt IPSec communications by modifying the outer packet in ways that cause plaintext data from the inner packet to be returned in ICMP messages, as demonstrated using bit-flipping attacks and (1) Destination Address Rewriting, (2) a modified header length that causes portions of the packet to be interpreted as IP Options, or (3) a modified protocol field and source address. | 2 | 6.4 | Medium | 2017-01-03 | 2016-10-17 | View | |
544 | CVE-2008-0569 | The Comment Upload 4.7.x before 4.7.x-0.1 and 5.x before 5.x-0.1 module for Drupal does not properly use functions in the upload module, which allows remote attackers to bypass upload validation, and upload arbitrary files and possibly execute arbitrary code, via unspecified vectors. | 2 | 6.4 | Medium | 2017-01-03 | 2011-03-07 | View |
Page 1155 of 17672, showing 5 records out of 88360 total, starting on record 5771, ending on 5775