CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
71422 | CVE-2014-4126 | Candidate | Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | Assigned (20140612) | None (candidate not yet proposed) | View | |
6142 | CVE-2002-1760 | Candidate | Multiple SQL injection vulnerabilities in PHProjekt 2.0 through 3.1 allow remote attackers to execute arbitrary SQL commands via the unknown attack vectors. | Assigned (20050621) | None (candidate not yet proposed) | View | |
71678 | CVE-2014-4382 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20140620) | None (candidate not yet proposed) | View | |
6398 | CVE-2002-2016 | Candidate | User-mode Linux (UML) 2.4.17-8 does not restrict access to kernel address space, which allows local users to execute arbitrary code. | Assigned (20050714) | None (candidate not yet proposed) | View | |
71934 | CVE-2014-4637 | Candidate | Open redirect vulnerability in EMC Documentum Web Development Kit (WDK) before 6.8 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via an unspecified parameter. | Assigned (20140624) | None (candidate not yet proposed) | View |
Page 20792 of 20943, showing 5 records out of 104715 total, starting on record 103956, ending on 103960