NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
73597 | CVE-2003-0470 | Buffer overflow in the RuFSI Utility Class ActiveX control (aka RuFSI Registry Information Class), as used for the Symantec Security Check service, allows remote attackers to execute arbitrary code via a long argument to CompareVersionStrings. | 2 | 7.5 | High | 2017-07-18 | 2017-07-10 | View | |
73853 | CVE-2003-0748 | Directory traversal vulnerability in wgate.dll for SAP Internet Transaction Server (ITS) 4620.2.0.323011 allows remote attackers to read arbitrary files via .. (dot-dot backslash) sequences in the ~theme parameter and a ~template parameter with a filename followed by space characters, which can prevent SAP from effectively adding a .html extension to the filename. | 2 | 5 | Medium | 2017-07-18 | 2017-07-10 | View | |
74109 | CVE-2003-1037 | Format string vulnerability in the WGate component for SAP Internet Transaction Server (ITS) allows remote attackers to execute arbitrary code via a high trace level. | 2 | 7.5 | High | 2017-07-18 | 2017-07-10 | View | |
77437 | CVE-2000-1205 | Cross site scripting vulnerabilities in Apache 1.3.0 through 1.3.11 allow remote attackers to execute script as other web site visitors via (1) the printenv CGI (printenv.pl), which does not encode its output, (2) pages generated by the ap_send_error_response function such as a default 404, which does not add an explicit charset, or (3) various messages that are generated by certain Apache modules or core code. NOTE: the printenv issue might still exist for web browsers that can render text/plain content types as HTML, such as Internet Explorer, but CVE regards this as a design limitation of those browsers, not Apache. The printenv.pl/acuparam vector, discloser on 20070724, is one such variant. | 2 | 4.3 | Medium | 2017-07-18 | 2017-07-10 | View | |
83069 | CVE-2017-0457 | An elevation of privilege vulnerability in the Qualcomm ADSPRPC driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31695439. References: QC-CR#1086123, QC-CR#1100695. | 2 | 7.6 | High | 2017-07-18 | 2017-07-17 | View |
Page 16970 of 17672, showing 5 records out of 88360 total, starting on record 84846, ending on 84850