NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 7536 | CVE-2011-0474 | Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle Cascading Style Sheets (CSS) token sequences in conjunction with cursors, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer." | 2 | 10 | High | 2017-01-07 | 2015-12-03 | View | |
| 73072 | CVE-2004-2695 | SQL injection vulnerability in the Authorize.net callback code (subscriptions/authorize.php) in Jelsoft vBulletin 3.0 through 3.0.3 allows remote attackers to execute arbitrary SQL statements via the x_invoice_num parameter. NOTE: this issue might be related to CVE-2006-4267. | 2 | 7.5 | High | 2016-12-20 | 2008-09-05 | View | |
| 8304 | CVE-2011-1346 | Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors, as demonstrated by Stephen Fewer as the second of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011. | 2 | 9.3 | High | 2017-01-07 | 2011-09-06 | View | |
| 73840 | CVE-2003-0734 | Unknown vulnerability in the pam_filter mechanism in pam_ldap before version 162, when LDAP based authentication is being used, allows users to bypass host-based access restrictions and log onto the system. | 2 | 10 | High | 2017-01-03 | 2008-09-10 | View | |
| 74096 | CVE-2003-1024 | Unknown vulnerability in the ls-F builtin function in tcsh on Solaris 8 allows local users to create or delete files as other users, and gain privileges. | 2 | 7.2 | High | 2017-07-18 | 2017-07-10 | View |
Page 3326 of 17672, showing 5 records out of 88360 total, starting on record 16626, ending on 16630