CVE List

Id CVE No. Status Description Phase Votes Comments Actions
46058  CVE-2010-3474  Candidate  IBM DB2 9.7 before FP3 does not perform the expected drops or invalidations of dependent functions upon a loss of privileges by the functions" owners, which allows remote authenticated users to bypass intended access restrictions via calls to these functions, a different vulnerability than CVE-2009-3471.  Assigned (20100920)  None (candidate not yet proposed)    View
46314  CVE-2010-3730  Candidate  Google Chrome before 6.0.472.62 does not properly use information about the origin of a document to manage properties, which allows remote attackers to have an unspecified impact via a crafted web site, related to a "property pollution" issue.  Assigned (20101005)  None (candidate not yet proposed)    View
46570  CVE-2010-3986  Candidate  Unspecified vulnerability in HP Virtual Connect Enterprise Manager (VCEM) 6.0 and 6.1 allows remote attackers to read arbitrary files via unknown vectors.  Assigned (20101018)  None (candidate not yet proposed)    View
46826  CVE-2010-4242  Candidate  The hci_uart_tty_open function in the HCI UART driver (drivers/bluetooth/hci_ldisc.c) in the Linux kernel 2.6.36, and possibly other versions, does not verify whether the tty has a write operation, which allows local users to cause a denial of service (NULL pointer dereference) via vectors related to the Bluetooth driver.  Assigned (20101116)  None (candidate not yet proposed)    View
47082  CVE-2010-4498  Candidate  Unspecified vulnerability in Collaborative Information Manager server, as used in TIBCO Collaborative Information Manager before 8.1.0 and ActiveCatalog before 1.0.1, allows remote attackers to modify data or obtain sensitive information via a crafted URL.  Assigned (20101207)  None (candidate not yet proposed)    View

Page 19273 of 20943, showing 5 records out of 104715 total, starting on record 96361, ending on 96365

Actions