NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
62169 | CVE-2006-3495 | AFP Server in Apple Mac OS X 10.3.9 and 10.4.7 stores reconnect keys in a world-readable file, which allows local users to obtain the keys and access files and folders of other users. | 2 | 2.1 | Low | 2016-12-20 | 2011-03-07 | View | |
62425 | CVE-2006-3757 | index.php in Zen Cart 1.3.0.2 allows remote attackers to obtain sensitive information via empty (1) _GET[], (2) _SESSION[], (3) _POST[], (4) _COOKIE[], or (5) _SESSION[] array parameters, which reveals the installation path in an error message. NOTE: this issue might be resultant from a global overwrite vulnerability. | 2 | 5 | Medium | 2016-12-20 | 2008-09-05 | View | |
62681 | CVE-2006-4023 | The ip2long function in PHP 5.1.4 and earlier may incorrectly validate an arbitrary string and return a valid network IP address, which allows remote attackers to obtain network information and facilitate other attacks, as demonstrated using SQL injection in the X-FORWARDED-FOR Header in index.php in MiniBB 2.0. NOTE: it could be argued that the ip2long behavior represents a risk for security-relevant issues in a way that is similar to strcpy"s role in buffer overflows, in which case this would be a class of implementation bugs that would require separate CVE items for each PHP application that uses ip2long in a security-relevant manner. | 2 | 5 | Medium | 2016-12-20 | 2008-09-05 | View | |
62937 | CVE-2006-4298 | Multiple directory traversal vulnerabilities in cache.php in osCommerce before 2.2 Milestone 2 060817 allow remote attackers to determine existence of arbitrary files and disclose the installation path via a .. (dot dot) in unspecified parameters in the (1) tep_cache_also_purchased, (2) tep_cache_manufacturers_box, and (3) tep_cache_categories_box functions. | 2 | 5 | Medium | 2016-12-20 | 2008-09-05 | View | |
63193 | CVE-2006-4560 | Internet Explorer 6 on Windows XP SP2 allows remote attackers to execute arbitrary JavaScript in the context of the browser"s session with an arbitrary intranet web server, by hosting script on an Internet web server that can be made inaccessible by the attacker and that has a domain name under the attacker"s control, which can force the browser to drop DNS pinning and perform a new DNS query for the domain name after the script is already running. | 2 | 7.5 | High | 2016-12-20 | 2008-09-05 | View |
Page 17448 of 17672, showing 5 records out of 88360 total, starting on record 87236, ending on 87240