NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
70727 | CVE-2004-0276 | The get_real_string function in Monkey HTTP Daemon (monkeyd) 0.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an HTTP request with a sequence of "%" characters and a missing Host field. | 2 | 5 | Medium | 2016-12-20 | 2016-10-17 | View | |
73031 | CVE-2004-2654 | The clientAbortBody function in client_side.c in Squid Web Proxy Cache before 2.6 STABLE6 allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors that trigger a null dereference. NOTE: in a followup advisory, a researcher claimed that the issue was a buffer overflow that was not fixed in STABLE6. However, the vendor"s bug report clearly shows that the researcher later retracted this claim, because the tested product was actually STABLE5. | 2 | 5 | Medium | 2016-12-20 | 2008-09-05 | View | |
58951 | CVE-2006-0211 | Cross-site scripting (XSS) vulnerability in forgotPassword.asp in Helm Hosting Control Panel 3.2.8 and earlier allows remote attackers to inject arbitrary web script or HTML via the txtEmailAddress parameter. | 2 | 4.3 | Medium | 2016-12-20 | 2011-03-07 | View | |
59207 | CVE-2006-0469 | Cross-site scripting (XSS) vulnerability in UebiMiau 2.7.9, and possibly earlier versions, allows remote attackers to inject arbitrary web script or HTML via a javascript: URI in the SRC attribute of an IMG tag. | 2 | 4.3 | Medium | 2016-12-20 | 2011-03-07 | View | |
59463 | CVE-2006-0732 | Directory traversal vulnerability in SAP Business Connector (BC) 4.6 and 4.7 allows remote attackers to read or delete arbitrary files via the fullName parameter to (1) sapbc/SAP/chopSAPLog.dsp or (2) invoke/sap.monitor.rfcTrace/deleteSingle. Details will be updated after the grace period has ended. NOTE: SAP Business Connector is an OEM version of webMethods Integration Server. webMethods states that this issue can only occur when the product is installed as root/admin, and if the attacker has access to a general purpose port; however, both are discouraged in the documentation. In addition, the attacker must already have acquired administrative privileges through other means. | 2 | 6.4 | Medium | 2016-12-20 | 2011-03-07 | View |
Page 406 of 17672, showing 5 records out of 88360 total, starting on record 2026, ending on 2030