CVE List

Id CVE No. Status Description Phase Votes Comments Actions
48149  CVE-2011-0237  Candidate  WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.  Assigned (20101223)  None (candidate not yet proposed)    View
48405  CVE-2011-0493  Candidate  Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values.  Assigned (20110118)  None (candidate not yet proposed)    View
48661  CVE-2011-0749  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20110202)  None (candidate not yet proposed)    View
48917  CVE-2011-1005  Candidate  The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.  Assigned (20110214)  None (candidate not yet proposed)    View
49173  CVE-2011-1261  Candidate  Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Selection Object Memory Corruption Vulnerability."  Assigned (20110304)  None (candidate not yet proposed)    View

Page 1718 of 20943, showing 5 records out of 104715 total, starting on record 8586, ending on 8590

Actions