NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
44518 | CVE-2012-2822 | The PDF functionality in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | 2 | 5 | Medium | 2017-01-19 | 2012-08-13 | View | |
45542 | CVE-2012-4074 | The Board Management Controller (BMC) in the Serial over LAN (SoL) subsystem in Cisco Unified Computing System (UCS) relies on a hardcoded private key, which allows man-in-the-middle attackers to obtain sensitive information or modify the data stream by leveraging knowledge of this key, aka Bug ID CSCte90338. | 2 | 5.8 | Medium | 2017-01-19 | 2016-09-23 | View | |
46310 | CVE-2012-5095 | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to inetd. | 2 | 4.4 | Medium | 2017-01-19 | 2013-10-10 | View | |
46566 | CVE-2012-5382 | ** DISPUTED ** Untrusted search path vulnerability in the installation functionality in Zend Server 5.6.0 SP4, when installed in the top-level C: directory, might allow local users to gain privileges via a Trojan horse DLL in the C:endendServershareendFrameworkin directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the choice of C: (and the resulting unsafe PATH) is established by an administrative action that is not a default part of the Zend Server installation. | 2 | 6 | Medium | 2017-01-19 | 2013-03-01 | View | |
46822 | CVE-2012-5785 | Apache Axis2/Java 1.6.2 and earlier does not verify that the server hostname matches a domain name in the subject"s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | 2 | 5.8 | Medium | 2017-01-19 | 2012-11-19 | View |
Page 16780 of 17672, showing 5 records out of 88360 total, starting on record 83896, ending on 83900