CVE List

Id CVE No. Status Description Phase Votes Comments Actions
47075  CVE-2010-4491  Candidate  Google Chrome before 8.0.552.215 does not properly restrict privileged extensions, which allows remote attackers to cause a denial of service (memory corruption) via a crafted extension.  Assigned (20101207)  None (candidate not yet proposed)    View
47331  CVE-2010-4747  Candidate  Cross-site scripting (XSS) vulnerability in wordpress-processing-embed/data/popup.php in the Processing Embed plugin 0.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pluginurl parameter.  Assigned (20110301)  None (candidate not yet proposed)    View
47587  CVE-2010-5003  Candidate  SQL injection vulnerability in the AutarTimonial (com_autartimonial) component 1.0.8 for Joomla! allows remote attackers to execute arbitrary SQL commands via the limit parameter in an autartimonial action to index.php. NOTE: some of these details are obtained from third party information.  Assigned (20111101)  None (candidate not yet proposed)    View
47843  CVE-2010-5259  Candidate  Multiple untrusted search path vulnerabilities in IsoBuster 2.8 allow local users to gain privileges via a Trojan horse (1) wnaspi32.dll or (2) ntaspi32.dll file in the current working directory, as demonstrated by a directory that contains a .img file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.  Assigned (20120907)  None (candidate not yet proposed)    View
48099  CVE-2011-0187  Candidate  The plug-in in QuickTime in Apple Mac OS X before 10.6.7 allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive video data via vectors involving a cross-site redirect.  Assigned (20101223)  None (candidate not yet proposed)    View

Page 18684 of 20943, showing 5 records out of 104715 total, starting on record 93416, ending on 93420

Actions