CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
81425 | CVE-2015-4148 | Candidate | The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue. | Assigned (20150601) | None (candidate not yet proposed) | View | |
16145 | CVE-2006-0041 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20051220) | None (candidate not yet proposed) | View | |
81681 | CVE-2015-4404 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20150606) | None (candidate not yet proposed) | View | |
16401 | CVE-2006-0297 | Candidate | Multiple integer overflows in Mozilla Firefox 1.5, Thunderbird 1.5 if Javascript is enabled in mail, and SeaMonkey before 1.0 might allow remote attackers to execute arbitrary code via the (1) EscapeAttributeValue in jsxml.c for E4X, (2) nsSVGCairoSurface::Init in SVG, and (3) nsCanvasRenderingContext2D.cpp in Canvas. | Assigned (20060118) | None (candidate not yet proposed) | View | |
81937 | CVE-2015-4660 | Candidate | Cross-site scripting (XSS) vulnerability in Enhanced SQL Portal 5.0.7961 allows remote attackers to inject arbitrary web script or HTML via the id parameter to iframe.php. | Assigned (20150618) | None (candidate not yet proposed) | View |
Page 1376 of 20943, showing 5 records out of 104715 total, starting on record 6876, ending on 6880