CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
44551 | CVE-2010-1967 | Candidate | Unspecified vulnerability in HP Insight Software Installer for Windows before 6.1 allows local users to read or modify data via unknown vectors. | Assigned (20100519) | None (candidate not yet proposed) | View | |
44807 | CVE-2010-2223 | Candidate | Virtual Desktop Server Manager (VDSM) in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H or rhev-hypervisor) before 5.5-2.2 does not properly perform VM post-zeroing after the removal of a virtual machine"s data, which allows guest OS users to obtain sensitive information by examining the disk blocks associated with a deleted virtual machine. | Assigned (20100609) | None (candidate not yet proposed) | View | |
45063 | CVE-2010-2479 | Candidate | Cross-site scripting (XSS) vulnerability in HTML Purifier before 4.1.1, as used in Mahara and other products, when the browser is Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | Assigned (20100628) | None (candidate not yet proposed) | View | |
45319 | CVE-2010-2735 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20100714) | None (candidate not yet proposed) | View | |
45575 | CVE-2010-2991 | Candidate | The IICAClient interface in the ICAClient library in the ICA Client ActiveX Object (aka ICO) component in Citrix Online Plug-in for Windows for XenApp & XenDesktop before 12.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HTML document that triggers the reading of a .ICA file. | Assigned (20100811) | None (candidate not yet proposed) | View |
Page 629 of 20943, showing 5 records out of 104715 total, starting on record 3141, ending on 3145