NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 24953 | CVE-2015-3010 | ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file. | 2 | 2.1 | Low | 2017-01-19 | 2016-12-02 | View | |
| 55135 | CVE-2007-2976 | Centrinity FirstClass 8.3 and earlier, and Server and Internet Services 8.0 and earlier, do not properly handle a URL with a null ("%00") character, which allows remote attackers to conduct cross-site scripting (XSS) attacks. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | 2 | 4.3 | Medium | 2017-01-07 | 2008-11-15 | View | |
| 74245 | CVE-2003-1173 | Centrinity FirstClass 7.1 allows remote attackers to access sensitive information by appending search to the end of the URL and checking all of the search option checkboxes and leaving the text field blank, which will return all files in the searched directory. | 2 | 5 | Medium | 2017-07-18 | 2017-07-10 | View | |
| 78096 | CVE-2001-0631 | Centrinity First Class Internet Services 5.50 allows for the circumventing of the default "spam" filters via the presence of "<@>" in the "From:" field, which allows remote attackers to send spoofed email with the identity of local users. | 2 | 5 | Medium | 2017-01-05 | 2008-09-05 | View | |
| 47122 | CVE-2012-6348 | Centrify Deployment Manager 2.1.0.283, as distributed in Centrify Suite before 2012.5, allows local users to (1) overwrite arbitrary files via a symlink attack on the adcheckDMoutput temporary file, or (2) overwrite arbitrary files and consequently gain privileges via a symlink attack on the centrify.cmd.0 temporary file. | 2 | 3.3 | Low | 2017-01-19 | 2013-01-08 | View |
Page 15356 of 17672, showing 5 records out of 88360 total, starting on record 76776, ending on 76780