CVE List

Id CVE No. Status Description Phase Votes Comments Actions
55800  CVE-2012-2557  Candidate  Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "cloneNode Use After Free Vulnerability."  Assigned (20120509)  None (candidate not yet proposed)    View
56056  CVE-2012-2813  Candidate  The exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.  Assigned (20120519)  None (candidate not yet proposed)    View
56312  CVE-2012-3069  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20120530)  None (candidate not yet proposed)    View
56568  CVE-2012-3325  Candidate  IBM WebSphere Application Server (WAS) 6.1.x before 6.1.0.45, 7.0.x before 7.0.0.25, 8.0.x before 8.0.0.5, and 8.5.x Full Profile before 8.5.0.1, when the PM44303 fix is installed, does not properly validate credentials, which allows remote authenticated users to obtain administrative access via unspecified vectors.  Assigned (20120607)  None (candidate not yet proposed)    View
56824  CVE-2012-3581  Candidate  Symantec Messaging Gateway (SMG) before 10.0 allows remote attackers to obtain potentially sensitive information about component versions via unspecified vectors.  Assigned (20120619)  None (candidate not yet proposed)    View

Page 20375 of 20943, showing 5 records out of 104715 total, starting on record 101871, ending on 101875

Actions