Total
5442 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-1265 | 1 Apple | 2 Mac Os X, Mac Os X Server | 2014-02-27 | 4.6 MEDIUM | N/A |
The systemsetup program in the Date and Time subsystem in Apple OS X before 10.9.2 allows local users to bypass intended access restrictions by changing the current time on the system clock. | |||||
CVE-2014-0817 | 1 Cybozu | 1 Garoon | 2014-02-27 | 4.9 MEDIUM | N/A |
Cybozu Garoon 2.x through 2.5.4 and 3.x through 3.7 SP3 does not properly manage sessions, which allows remote authenticated users to impersonate arbitrary users via unspecified vectors. | |||||
CVE-2014-0816 | 1 Norman | 1 Security Suite | 2014-02-27 | 7.2 HIGH | N/A |
Unspecified vulnerability in Norman Security Suite 10.1 and earlier allows local users to gain privileges via unknown vectors. | |||||
CVE-2014-1257 | 1 Apple | 1 Mac Os X | 2014-02-27 | 3.6 LOW | N/A |
CFNetwork in Apple OS X through 10.8.5 does not remove session cookies upon a Safari reset action, which allows physically proximate attackers to bypass intended access restrictions by leveraging an unattended workstation. | |||||
CVE-2013-6945 | 1 Osehra | 1 Vista | 2014-02-25 | 7.5 HIGH | N/A |
The M2M Broker in OSEHRA VistA, as distributed before September 30, 2013, allows attackers to bypass authentication and authorization to perform doctor-only actions and read or modify patient records via unspecified vectors related to a "logic flaw." | |||||
CVE-2014-0031 | 1 Apache | 1 Cloudstack | 2014-02-25 | 4.0 MEDIUM | N/A |
The (1) ListNetworkACL and (2) listNetworkACLLists APIs in Apache CloudStack before 4.2.1 allow remote authenticated users to list network ACLS for other users via a crafted request. | |||||
CVE-2012-6635 | 1 Wordpress | 1 Wordpress | 2014-02-25 | 4.0 MEDIUM | N/A |
wp-admin/includes/class-wp-posts-list-table.php in WordPress before 3.3.3 does not properly restrict excerpt-view access, which allows remote authenticated users to obtain sensitive information by visiting a draft. | |||||
CVE-2012-6634 | 1 Wordpress | 1 Wordpress | 2014-02-25 | 6.4 MEDIUM | N/A |
wp-admin/media-upload.php in WordPress before 3.3.3 allows remote attackers to obtain sensitive information or bypass intended media-attachment restrictions via a post_id value. | |||||
CVE-2013-2747 | 1 Courion | 1 Access Risk Management Suite | 2014-02-21 | 6.5 MEDIUM | N/A |
The password reset feature in Courion Access Risk Management Suite Version 8 Update 9 allows remote authenticated users to bypass intended Internet Explorer usage restrictions and execute arbitrary commands by using keyboard shortcuts to navigate the file system and open a command prompt. | |||||
CVE-2012-6108 | 1 Hp | 1 Linux Imaging And Printing Project | 2014-02-21 | 2.1 LOW | N/A |
HP Linux Imaging and Printing (HPLIP) before 3.13.2 uses world-writable permissions for /var/log/hp and /var/log/hp/tmp, which allows local users to delete log files via standard filesystem operations. | |||||
CVE-2013-4661 | 1 Civicrm | 1 Civicrm | 2014-02-21 | 4.9 MEDIUM | N/A |
CiviCRM 2.0.0 through 4.2.9 and 4.3.0 through 4.3.3 does not properly enforce role-based access control (RBAC) restrictions for default custom searches, which allows remote authenticated users with the "access CiviCRM" permission to bypass intended access restrictions, as demonstrated by accessing custom contribution data without having the "access CiviContribute" permission. | |||||
CVE-2014-1476 | 1 Drupal | 1 Drupal | 2014-02-21 | 4.0 MEDIUM | N/A |
The Taxonomy module in Drupal 7.x before 7.26, when upgraded from an earlier version of Drupal, does not properly restrict access to unpublished content, which allows remote authenticated users to obtain sensitive information via a listing page. | |||||
CVE-2013-7135 | 1 Detlef Pilzecker | 1 Proc\ | 2014-02-21 | 7.2 HIGH | N/A |
The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file. | |||||
CVE-2012-3174 | 1 Oracle | 2 Jdk, Jre | 2014-02-21 | 10.0 HIGH | N/A |
Unspecified vulnerability in Oracle Java 7 before Update 11 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-0422. NOTE: some parties have mapped CVE-2012-3174 to an issue involving recursive use of the Reflection API, but that issue is already covered as part of CVE-2013-0422. This identifier is for a different vulnerability whose details are not public as of 20130114. | |||||
CVE-2010-2441 | 1 Apple | 1 Webkit | 2014-02-21 | 4.3 MEDIUM | N/A |
WebKit does not properly restrict focus changes, which allows remote attackers to read keystrokes via "cross-domain IFRAME gadgets," a different vulnerability than CVE-2010-1126, CVE-2010-1422, and CVE-2010-2295. | |||||
CVE-2013-1069 | 1 Ubuntu | 1 Metal As A Service | 2014-02-21 | 2.1 LOW | N/A |
Ubuntu Metal as a Service (MaaS) 1.2 and 1.4 uses world-readable permissions for txlongpoll.yaml, which allows local users to obtain RabbitMQ authentication credentials by reading the file. | |||||
CVE-2013-4737 | 1 Qualcomm | 1 Quic Mobile Station Modem Kernel | 2014-02-18 | 9.3 HIGH | N/A |
The CONFIG_STRICT_MEMORY_RWX implementation for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly consider certain memory sections, which makes it easier for attackers to bypass intended access restrictions by leveraging the presence of RWX memory at a fixed location. | |||||
CVE-2013-6492 | 1 Ryan Ohara | 1 Piranha | 2014-02-18 | 5.8 MEDIUM | N/A |
The Piranha Configuration Tool in Piranha 0.8.6 does not properly restrict access to webpages, which allows remote attackers to bypass authentication and read or modify the LVS configuration via an HTTP POST request. | |||||
CVE-2013-6441 | 1 Linuxcontainers | 1 Lxc | 2014-02-18 | 7.2 HIGH | N/A |
The lxc-sshd template (templates/lxc-sshd.in) in LXC before 1.0.0.beta2 uses read-write permissions when mounting /sbin/init, which allows local users to gain privileges by modifying the init file. | |||||
CVE-2012-4466 | 1 Ruby-lang | 1 Ruby | 2014-02-12 | 5.0 MEDIUM | N/A |
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005. |