CVE List

Id CVE No. Status Description Phase Votes Comments Actions
58101  CVE-2012-4858  Candidate  IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 does not properly validate Java serialized input, which allows remote attackers to execute arbitrary commands via unspecified vectors.  Assigned (20120906)  None (candidate not yet proposed)    View
58357  CVE-2012-5114  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20120924)  None (candidate not yet proposed)    View
58613  CVE-2012-5370  Candidate  JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.  Assigned (20121010)  None (candidate not yet proposed)    View
58869  CVE-2012-5626  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20121024)  None (candidate not yet proposed)    View
59125  CVE-2012-5882  Candidate  Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.5.0 through 2.9.0 allows remote attackers to inject arbitrary web script or HTML via vectors related to uploader.swf, a similar issue to CVE-2010-4208.  Assigned (20121116)  None (candidate not yet proposed)    View

Page 20136 of 20943, showing 5 records out of 104715 total, starting on record 100676, ending on 100680

Actions