Max CVSS | 10.0 | Min CVSS | 5.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2010-1423 | 9.3 |
Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote attackers to execute arbitrary code
|
13-05-2022 - 14:52 | 15-04-2010 - 21:30 | |
CVE-2011-2796 | 6.8 |
Use-after-free vulnerability in Skia, as used in Google Chrome before 13.0.782.107, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
|
21-05-2020 - 01:12 | 03-08-2011 - 00:55 | |
CVE-2011-2429 | 5.0 |
Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, related to a "security
|
30-10-2018 - 16:26 | 22-09-2011 - 03:38 | |
CVE-2011-2110 | 10.0 |
Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.23 and earlier on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exp
|
30-10-2018 - 16:26 | 16-06-2011 - 23:55 | |
CVE-2011-0575 | 6.9 |
Untrusted search path vulnerability in Adobe Flash Player before 10.2.152.26 allows local users to gain privileges via a Trojan horse DLL in the current working directory. Per: http://cwe.mitre.org/data/definitions/426.html
'CWE-426: Untrusted Sea
|
30-10-2018 - 16:26 | 10-02-2011 - 16:00 | |
CVE-2010-0843 | 7.5 |
Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the
|
10-10-2018 - 19:54 | 01-04-2010 - 16:30 | |
CVE-2005-4552 | 7.2 |
The (1) slsmgr and (2) slsadmin programs in Sun Solaris PC NetLink 2.0 create temporary files insecurely, which allows local users to gain privileges.
|
11-10-2017 - 01:30 | 28-12-2005 - 11:03 | |
CVE-2011-4692 | 5.0 |
WebKit, as used in Apple Safari 5.1.1 and earlier and Google Chrome 15 and earlier, does not prevent capture of data about the time required for image loading, which makes it easier for remote attackers to determine whether an image exists in the bro
|
19-09-2017 - 01:34 | 07-12-2011 - 19:55 | |
CVE-2011-2075 | 9.3 |
Unspecified vulnerability in Google Chrome 11.0.696.65 on Windows 7 SP1 allows remote attackers to execute arbitrary code via unknown vectors. NOTE: as of 20110510, the only disclosure is a vague advisory that possibly relates to multiple vulnerabil
|
19-09-2017 - 01:32 | 10-05-2011 - 18:55 | |
CVE-2010-0647 | 9.3 |
WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence.
|
19-09-2017 - 01:30 | 18-02-2010 - 18:00 | |
CVE-2010-0664 | 5.0 |
Stack consumption vulnerability in the ChildProcessSecurityPolicy::CanRequestURL function in browser/child_process_security_policy.cc in Google Chrome before 4.0.249.78 allows remote attackers to cause a denial of service (memory consumption and appl
|
19-09-2017 - 01:30 | 18-02-2010 - 18:00 |