NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 38690 | CVE-2013-2758 | Apache CloudStack 4.0.0 before 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x before 3.0.6 Patch C uses a hash of a predictable sequence, which makes it easier for remote attackers to guess the console access URL via a brute force attack. | 2 | 5 | Medium | 2017-01-18 | 2014-05-27 | View | |
| 38946 | CVE-2013-3080 | VMware vCenter Server Appliance (vCSA) 5.1 before Update 1 allows remote authenticated users to create or overwrite arbitrary files, and consequently execute arbitrary code or cause a denial of service, by leveraging Virtual Appliance Management Interface (VAMI) web-interface access. | 2 | 9 | High | 2017-01-18 | 2013-05-01 | View | |
| 39202 | CVE-2013-3398 | The web framework in Cisco Prime Central for Hosted Collaboration Solution (HCS) Assurance provides different responses to requests for arbitrary pathnames depending on whether the pathname exists, which allows remote attackers to enumerate directories and files via a series of crafted requests, aka Bug ID CSCuh64574. | 2 | 5 | Medium | 2017-01-18 | 2013-06-27 | View | |
| 39714 | CVE-2013-4027 | IBM Maximo Asset Management 6.2 through 6.2.8, 7.1 through 7.1.1.12, and 7.5 before 7.5.0.5 allows remote authenticated users to bypass intended access restrictions via unspecified vectors. | 2 | 6.5 | Medium | 2017-01-18 | 2013-10-10 | View | |
| 39970 | CVE-2013-4351 | GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey. | 2 | 5.8 | Medium | 2017-01-18 | 2014-01-03 | View |
Page 2354 of 17672, showing 5 records out of 88360 total, starting on record 11766, ending on 11770