CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
47075 | CVE-2010-4491 | Candidate | Google Chrome before 8.0.552.215 does not properly restrict privileged extensions, which allows remote attackers to cause a denial of service (memory corruption) via a crafted extension. | Assigned (20101207) | None (candidate not yet proposed) | View | |
47331 | CVE-2010-4747 | Candidate | Cross-site scripting (XSS) vulnerability in wordpress-processing-embed/data/popup.php in the Processing Embed plugin 0.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pluginurl parameter. | Assigned (20110301) | None (candidate not yet proposed) | View | |
47587 | CVE-2010-5003 | Candidate | SQL injection vulnerability in the AutarTimonial (com_autartimonial) component 1.0.8 for Joomla! allows remote attackers to execute arbitrary SQL commands via the limit parameter in an autartimonial action to index.php. NOTE: some of these details are obtained from third party information. | Assigned (20111101) | None (candidate not yet proposed) | View | |
47843 | CVE-2010-5259 | Candidate | Multiple untrusted search path vulnerabilities in IsoBuster 2.8 allow local users to gain privileges via a Trojan horse (1) wnaspi32.dll or (2) ntaspi32.dll file in the current working directory, as demonstrated by a directory that contains a .img file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | Assigned (20120907) | None (candidate not yet proposed) | View | |
48099 | CVE-2011-0187 | Candidate | The plug-in in QuickTime in Apple Mac OS X before 10.6.7 allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive video data via vectors involving a cross-site redirect. | Assigned (20101223) | None (candidate not yet proposed) | View |
Page 18684 of 20943, showing 5 records out of 104715 total, starting on record 93416, ending on 93420