CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
48149 | CVE-2011-0237 | Candidate | WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1. | Assigned (20101223) | None (candidate not yet proposed) | View | |
48405 | CVE-2011-0493 | Candidate | Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values. | Assigned (20110118) | None (candidate not yet proposed) | View | |
48661 | CVE-2011-0749 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20110202) | None (candidate not yet proposed) | View | |
48917 | CVE-2011-1005 | Candidate | The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname. | Assigned (20110214) | None (candidate not yet proposed) | View | |
49173 | CVE-2011-1261 | Candidate | Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Selection Object Memory Corruption Vulnerability." | Assigned (20110304) | None (candidate not yet proposed) | View |
Page 1718 of 20943, showing 5 records out of 104715 total, starting on record 8586, ending on 8590