CVE List

Id CVE No. Status Description Phase Votes Comments Actions
43768  CVE-2010-1184  Candidate  The Microsoft wireless keyboard uses XOR encryption with a key derived from the MAC address, which makes it easier for remote attackers to obtain keystroke information and inject arbitrary commands via a nearby wireless device, as demonstrated by Keykeriki 2.  Assigned (20100329)  None (candidate not yet proposed)    View
44024  CVE-2010-1440  Candidate  Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live 2009 and earlier, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a special command in a DVI file, related to the (1) predospecial and (2) bbdospecial functions, a different vulnerability than CVE-2010-0739.  Assigned (20100415)  None (candidate not yet proposed)    View
44280  CVE-2010-1696  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20100430)  None (candidate not yet proposed)    View
44536  CVE-2010-1952  Candidate  Directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.  Assigned (20100518)  None (candidate not yet proposed)    View
44792  CVE-2010-2208  Candidate  Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, dereference a heap object after this object"s deletion, which allows attackers to execute arbitrary code via unspecified vectors.  Assigned (20100608)  None (candidate not yet proposed)    View

Page 20351 of 20943, showing 5 records out of 104715 total, starting on record 101751, ending on 101755

Actions