National Cyber Awareness System:
05/18/2015 06:08 AM EDT
Original release date: May 18, 2015
The US-CERT Cyber Security Bulletin provides a
summary of new vulnerabilities that have been
recorded by the National Institute of
Standards and Technology (NIST) National
Vulnerability Database (NVD) in the past week.
The NVD is sponsored by the Department
of Homeland Security (DHS) National
Cybersecurity and Communications Integration
Center (NCCIC) / United States
Computer Emergency Readiness Team (US-CERT).
For modified or updated entries, please visit the NVD, which contains historical
vulnerability information.
The vulnerabilities are based on the CVE
vulnerability naming standard and are organized
according to severity, determined by the Common Vulnerability Scoring
System (CVSS) standard. The division of high,
medium, and low severities correspond to the
following scores:
-
High
- Vulnerabilities will be labeled High severity
if they have a CVSS base score of 7.0 - 10.0
-
Medium -
Vulnerabilities will be labeled Medium severity
if they have a CVSS base score of 4.0 - 6.9
-
Low
- Vulnerabilities will be labeled Low severity
if they have a CVSS base score of 0.0 - 3.9
Entries may include additional information provided
by organizations and efforts sponsored by US-CERT.
This information may include identifying
information, values, definitions, and related links.
Patch information is provided when available. Please
note that some of the information in the bulletins
is compiled from external, open source reports and
is not a direct result of US-CERT analysis.
High Vulnerabilities
Primary
Vendor -- Product |
Description |
Published |
CVSS Score |
Source
& Patch Info |
adobe --
acrobat |
Multiple
heap-based buffer overflows in Adobe Reader
and Acrobat 10.x before 10.1.14 and 11.x
before 11.0.11 on Windows and OS X allow
attackers to execute arbitrary code via
unknown vectors. |
2015-05-13 |
10.0 |
CVE-2014-9160
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to execute arbitrary code or
cause a denial of service (memory
corruption) via unspecified vectors, a
different vulnerability than CVE-2014-9161,
CVE-2015-3049, CVE-2015-3050, CVE-2015-3051,
CVE-2015-3052, CVE-2015-3056, CVE-2015-3057,
CVE-2015-3070, and CVE-2015-3076. |
2015-05-13 |
10.0 |
CVE-2015-3046
CONFIRM |
adobe --
acrobat |
Buffer
overflow in Adobe Reader and Acrobat 10.x
before 10.1.14 and 11.x before 11.0.11 on
Windows and OS X allows attackers to execute
arbitrary code via unknown vectors. |
2015-05-13 |
10.0 |
CVE-2015-3048
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to execute arbitrary code or
cause a denial of service (memory
corruption) via unspecified vectors, a
different vulnerability than CVE-2014-9161,
CVE-2015-3046, CVE-2015-3050, CVE-2015-3051,
CVE-2015-3052, CVE-2015-3056, CVE-2015-3057,
CVE-2015-3070, and CVE-2015-3076. |
2015-05-13 |
10.0 |
CVE-2015-3049
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to execute arbitrary code or
cause a denial of service (memory
corruption) via unspecified vectors, a
different vulnerability than CVE-2014-9161,
CVE-2015-3046, CVE-2015-3049, CVE-2015-3051,
CVE-2015-3052, CVE-2015-3056, CVE-2015-3057,
CVE-2015-3070, and CVE-2015-3076. |
2015-05-13 |
10.0 |
CVE-2015-3050
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to execute arbitrary code or
cause a denial of service (memory
corruption) via unspecified vectors, a
different vulnerability than CVE-2014-9161,
CVE-2015-3046, CVE-2015-3049, CVE-2015-3050,
CVE-2015-3052, CVE-2015-3056, CVE-2015-3057,
CVE-2015-3070, and CVE-2015-3076. |
2015-05-13 |
10.0 |
CVE-2015-3051
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to execute arbitrary code or
cause a denial of service (memory
corruption) via unspecified vectors, a
different vulnerability than CVE-2014-9161,
CVE-2015-3046, CVE-2015-3049, CVE-2015-3050,
CVE-2015-3051, CVE-2015-3056, CVE-2015-3057,
CVE-2015-3070, and CVE-2015-3076. |
2015-05-13 |
10.0 |
CVE-2015-3052
CONFIRM |
adobe --
acrobat |
Use-after-free
vulnerability in Adobe Reader and Acrobat
10.x before 10.1.14 and 11.x before 11.0.11
on Windows and OS X allows attackers to
execute arbitrary code via unspecified
vectors, a different vulnerability than
CVE-2015-3054, CVE-2015-3055, CVE-2015-3059,
and CVE-2015-3075. |
2015-05-13 |
10.0 |
CVE-2015-3053
CONFIRM |
adobe --
acrobat |
Use-after-free
vulnerability in Adobe Reader and Acrobat
10.x before 10.1.14 and 11.x before 11.0.11
on Windows and OS X allows attackers to
execute arbitrary code via unspecified
vectors, a different vulnerability than
CVE-2015-3053, CVE-2015-3055, CVE-2015-3059,
and CVE-2015-3075. |
2015-05-13 |
10.0 |
CVE-2015-3054
CONFIRM |
adobe --
acrobat |
Use-after-free
vulnerability in Adobe Reader and Acrobat
10.x before 10.1.14 and 11.x before 11.0.11
on Windows and OS X allows attackers to
execute arbitrary code via unspecified
vectors, a different vulnerability than
CVE-2015-3053, CVE-2015-3054, CVE-2015-3059,
and CVE-2015-3075. |
2015-05-13 |
7.5 |
CVE-2015-3055
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to execute arbitrary code or
cause a denial of service (memory
corruption) via unspecified vectors, a
different vulnerability than CVE-2014-9161,
CVE-2015-3046, CVE-2015-3049, CVE-2015-3050,
CVE-2015-3051, CVE-2015-3052, CVE-2015-3057,
CVE-2015-3070, and CVE-2015-3076. |
2015-05-13 |
10.0 |
CVE-2015-3056
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to execute arbitrary code or
cause a denial of service (memory
corruption) via unspecified vectors, a
different vulnerability than CVE-2014-9161,
CVE-2015-3046, CVE-2015-3049, CVE-2015-3050,
CVE-2015-3051, CVE-2015-3052, CVE-2015-3056,
CVE-2015-3070, and CVE-2015-3076. |
2015-05-13 |
10.0 |
CVE-2015-3057
CONFIRM |
adobe --
acrobat |
Use-after-free
vulnerability in Adobe Reader and Acrobat
10.x before 10.1.14 and 11.x before 11.0.11
on Windows and OS X allows attackers to
execute arbitrary code via unspecified
vectors, a different vulnerability than
CVE-2015-3053, CVE-2015-3054, CVE-2015-3055,
and CVE-2015-3075. |
2015-05-13 |
10.0 |
CVE-2015-3059
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3061,
CVE-2015-3062, CVE-2015-3063, CVE-2015-3064,
CVE-2015-3065, CVE-2015-3066, CVE-2015-3067,
CVE-2015-3068, CVE-2015-3069, CVE-2015-3071,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3060
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3062, CVE-2015-3063, CVE-2015-3064,
CVE-2015-3065, CVE-2015-3066, CVE-2015-3067,
CVE-2015-3068, CVE-2015-3069, CVE-2015-3071,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3061
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3063, CVE-2015-3064,
CVE-2015-3065, CVE-2015-3066, CVE-2015-3067,
CVE-2015-3068, CVE-2015-3069, CVE-2015-3071,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3062
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3064,
CVE-2015-3065, CVE-2015-3066, CVE-2015-3067,
CVE-2015-3068, CVE-2015-3069, CVE-2015-3071,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3063
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3063,
CVE-2015-3065, CVE-2015-3066, CVE-2015-3067,
CVE-2015-3068, CVE-2015-3069, CVE-2015-3071,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3064
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3063,
CVE-2015-3064, CVE-2015-3066, CVE-2015-3067,
CVE-2015-3068, CVE-2015-3069, CVE-2015-3071,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3065
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3063,
CVE-2015-3064, CVE-2015-3065, CVE-2015-3067,
CVE-2015-3068, CVE-2015-3069, CVE-2015-3071,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3066
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3063,
CVE-2015-3064, CVE-2015-3065, CVE-2015-3066,
CVE-2015-3068, CVE-2015-3069, CVE-2015-3071,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3067
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3063,
CVE-2015-3064, CVE-2015-3065, CVE-2015-3066,
CVE-2015-3067, CVE-2015-3069, CVE-2015-3071,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3068
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3063,
CVE-2015-3064, CVE-2015-3065, CVE-2015-3066,
CVE-2015-3067, CVE-2015-3068, CVE-2015-3071,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3069
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to execute arbitrary code or
cause a denial of service (memory
corruption) via unspecified vectors, a
different vulnerability than CVE-2014-9161,
CVE-2015-3046, CVE-2015-3049, CVE-2015-3050,
CVE-2015-3051, CVE-2015-3052, CVE-2015-3056,
CVE-2015-3057, and CVE-2015-3076. |
2015-05-13 |
10.0 |
CVE-2015-3070
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3063,
CVE-2015-3064, CVE-2015-3065, CVE-2015-3066,
CVE-2015-3067, CVE-2015-3068, CVE-2015-3069,
CVE-2015-3072, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3071
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3063,
CVE-2015-3064, CVE-2015-3065, CVE-2015-3066,
CVE-2015-3067, CVE-2015-3068, CVE-2015-3069,
CVE-2015-3071, CVE-2015-3073, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3072
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3063,
CVE-2015-3064, CVE-2015-3065, CVE-2015-3066,
CVE-2015-3067, CVE-2015-3068, CVE-2015-3069,
CVE-2015-3071, CVE-2015-3072, and
CVE-2015-3074. |
2015-05-13 |
10.0 |
CVE-2015-3073
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to bypass intended
restrictions on JavaScript API execution via
unspecified vectors, a different
vulnerability than CVE-2015-3060,
CVE-2015-3061, CVE-2015-3062, CVE-2015-3063,
CVE-2015-3064, CVE-2015-3065, CVE-2015-3066,
CVE-2015-3067, CVE-2015-3068, CVE-2015-3069,
CVE-2015-3071, CVE-2015-3072, and
CVE-2015-3073. |
2015-05-13 |
10.0 |
CVE-2015-3074
CONFIRM |
adobe --
acrobat |
Use-after-free
vulnerability in Adobe Reader and Acrobat
10.x before 10.1.14 and 11.x before 11.0.11
on Windows and OS X allows attackers to
execute arbitrary code via unspecified
vectors, a different vulnerability than
CVE-2015-3053, CVE-2015-3054, CVE-2015-3055,
and CVE-2015-3059. |
2015-05-13 |
10.0 |
CVE-2015-3075
CONFIRM |
adobe --
acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to execute arbitrary code or
cause a denial of service (memory
corruption) via unspecified vectors, a
different vulnerability than CVE-2014-9161,
CVE-2015-3046, CVE-2015-3049, CVE-2015-3050,
CVE-2015-3051, CVE-2015-3052, CVE-2015-3056,
CVE-2015-3057, and CVE-2015-3070. |
2015-05-13 |
10.0 |
CVE-2015-3076
CONFIRM |
adobe --
adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow attackers
to execute arbitrary code by leveraging an
unspecified "type confusion," a different
vulnerability than CVE-2015-3084 and
CVE-2015-3086. |
2015-05-13 |
10.0 |
CVE-2015-3077
CONFIRM |
adobe --
adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow attackers
to execute arbitrary code or cause a denial
of service (memory corruption) via
unspecified vectors, a different
vulnerability than CVE-2015-3089,
CVE-2015-3090, and CVE-2015-3093. |
2015-05-13 |
10.0 |
CVE-2015-3078
CONFIRM |
adobe --
adobe_air |
Use-after-free
vulnerability in Adobe Flash Player before
13.0.0.289 and 14.x through 17.x before
17.0.0.188 on Windows and OS X and before
11.2.202.460 on Linux, Adobe AIR before
17.0.0.172, Adobe AIR SDK before 17.0.0.172,
and Adobe AIR SDK & Compiler before
17.0.0.172 allows attackers to execute
arbitrary code via unspecified vectors. |
2015-05-13 |
10.0 |
CVE-2015-3080
CONFIRM |
adobe --
adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow attackers
to execute arbitrary code by leveraging an
unspecified "type confusion," a different
vulnerability than CVE-2015-3077 and
CVE-2015-3086. |
2015-05-13 |
10.0 |
CVE-2015-3084
CONFIRM |
adobe --
adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow attackers
to execute arbitrary code by leveraging an
unspecified "type confusion," a different
vulnerability than CVE-2015-3077 and
CVE-2015-3084. |
2015-05-13 |
10.0 |
CVE-2015-3086
CONFIRM |
adobe --
adobe_air |
Integer
overflow in Adobe Flash Player before
13.0.0.289 and 14.x through 17.x before
17.0.0.188 on Windows and OS X and before
11.2.202.460 on Linux, Adobe AIR before
17.0.0.172, Adobe AIR SDK before 17.0.0.172,
and Adobe AIR SDK & Compiler before
17.0.0.172 allows attackers to execute
arbitrary code via unspecified vectors. |
2015-05-13 |
10.0 |
CVE-2015-3087
CONFIRM |
adobe --
adobe_air |
Heap-based
buffer overflow in Adobe Flash Player before
13.0.0.289 and 14.x through 17.x before
17.0.0.188 on Windows and OS X and before
11.2.202.460 on Linux, Adobe AIR before
17.0.0.172, Adobe AIR SDK before 17.0.0.172,
and Adobe AIR SDK & Compiler before
17.0.0.172 allows attackers to execute
arbitrary code via unspecified vectors. |
2015-05-13 |
10.0 |
CVE-2015-3088
CONFIRM |
adobe --
adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow attackers
to execute arbitrary code or cause a denial
of service (memory corruption) via
unspecified vectors, a different
vulnerability than CVE-2015-3078,
CVE-2015-3090, and CVE-2015-3093. |
2015-05-13 |
10.0 |
CVE-2015-3089
CONFIRM |
adobe --
adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow attackers
to execute arbitrary code or cause a denial
of service (memory corruption) via
unspecified vectors, a different
vulnerability than CVE-2015-3078,
CVE-2015-3089, and CVE-2015-3093. |
2015-05-13 |
10.0 |
CVE-2015-3090
CONFIRM |
adobe --
adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow attackers
to execute arbitrary code or cause a denial
of service (memory corruption) via
unspecified vectors, a different
vulnerability than CVE-2015-3078,
CVE-2015-3089, and CVE-2015-3090. |
2015-05-13 |
10.0 |
CVE-2015-3093
CONFIRM |
citrix
--
netscaler_application_delivery_controller_firmware |
Citrix
NetScaler Application Delivery Controller
(ADC) and NetScaler Gateway before 10.5
Build 53.9 through 55.8 and 10.5.e Build
53-9010.e allow remote attackers to cause a
denial of service (reboot) via unspecified
vectors. |
2015-05-12 |
7.8 |
CVE-2015-2829
CONFIRM |
clip-bucket
-- clipbucket |
Multiple
SQL injection vulnerabilities in ClipBucket
2.6 Revision 738 and earlier allow remote
attackers to execute arbitrary SQL commands
via the (1) uid parameter in an add_friend
action to ajax.php; id parameter in a (2)
share_object, (3) add_to_fav, (4) rating, or
(5) flag_object action to ajax.php; cid
parameter in an (6) add_new_item, (7)
remove_collection_item, (8) get_item, or (9)
load_more_items action to ajax.php; (10)
ci_id parameter in a get_item action to
ajax.php; user parameter to (11)
user_contacts.php or (12) view_channel.php;
(13) pid parameter to view_page.php; (14)
tid parameter to view_topic.php; or (15) v
parameter to watch_video.php. |
2015-05-14 |
7.5 |
CVE-2012-5849
CONFIRM
CONFIRM
MISC
BID
EXPLOIT-DB
OSVDB
OSVDB
OSVDB
OSVDB
OSVDB
OSVDB
BUGTRAQ
BUGTRAQ |
goautodial
-- goadmin_ce |
Unrestricted
file upload vulnerability in
go_audiostore.php in the audiostore (Voice
Files) upload functionality in GoAutoDial
GoAdmin CE 3.x before 3.3-1421902800 allows
remote attackers to execute arbitrary code
by uploading a file with an executable
extension, then accessing it via a direct
request to the file in sounds/. |
2015-05-12 |
10.0 |
CVE-2015-2842
EXPLOIT-DB
CONFIRM |
goautodial
-- goadmin_ce |
Multiple
SQL injection vulnerabilities in GoAutoDial
GoAdmin CE before 3.3-1421902800 allow
remote attackers to execute arbitrary SQL
commands via the (1) user_name or (2)
user_pass parameter in go_login.php or the
PATH_INFO to (3)
go_login/validate_credentials/admin/ or (4)
index.php/go_site/go_get_user_info/. |
2015-05-12 |
7.5 |
CVE-2015-2843
EXPLOIT-DB
CONFIRM |
goautodial
-- goadmin_ce |
The
cpanel function in go_site.php in GoAutoDial
GoAdmin CE before 3.3-1420434000 allows
remote attackers to execute arbitrary
commands via the $action portion of the
PATH_INFO. |
2015-05-12 |
10.0 |
CVE-2015-2844
EXPLOIT-DB
CONFIRM |
goautodial
-- goadmin_ce |
The
cpanel function in go_site.php in GoAutoDial
GoAdmin CE before 3.3-1421902800 allows
remote attackers to execute arbitrary
commands via the $type portion of the
PATH_INFO. |
2015-05-12 |
10.0 |
CVE-2015-2845
EXPLOIT-DB
CONFIRM |
lenovo
-- system_update |
Lenovo
System Update (formerly ThinkVantage System
Update) before 5.06.0034 uses predictable
security tokens, which allows local users to
gain privileges by sending a valid token
with a command to the System Update service
(SUService.exe) through an unspecified named
pipe. |
2015-05-12 |
7.2 |
CVE-2015-2219
MISC
CONFIRM
SECTRACK |
lenovo
-- system_update |
Lenovo
System Update (formerly ThinkVantage System
Update) before 5.06.0034 does not properly
validate CA chains during signature
validation, which allows man-in-the-middle
attackers to upload and execute arbitrary
files via a crafted certificate. |
2015-05-12 |
8.3 |
CVE-2015-2233
MISC
CONFIRM
SECTRACK |
mcafee
-- epo_deep_command |
Multiple
unquoted Windows search path vulnerabilities
in the (1) Client Management and (2) Gateway
in McAfee ePO Deep Command 2.1 and 2.2
before HF 1058831 allow local users to gain
privileges via unspecified vectors. |
2015-05-14 |
7.2 |
CVE-2015-3987
CONFIRM |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 11 allows remote attackers
to execute arbitrary code or cause a denial
of service (memory corruption) via a crafted
web site, aka "Internet Explorer Memory
Corruption Vulnerability," a different
vulnerability than CVE-2015-1706,
CVE-2015-1711, CVE-2015-1717, and
CVE-2015-1718. |
2015-05-13 |
9.3 |
CVE-2015-1658
MS |
microsoft
-- .net_framework |
The
Windows DirectWrite library, as used in
Microsoft .NET Framework 3.0 SP2, 3.5,
3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007
SP3 and 2010 SP2; Live Meeting 2007 Console;
Lync 2010; Lync 2010 Attendee; Lync 2013
SP1; Lync Basic 2013 SP1; Silverlight 5
before 5.1.40416.00; and Silverlight 5
Developer Runtime before 5.1.40416.00,
allows remote attackers to execute arbitrary
code via a crafted TrueType font, aka
"TrueType Font Parsing Vulnerability." |
2015-05-13 |
9.3 |
CVE-2015-1671
MS |
microsoft
-- .net_framework |
The
Windows Forms (aka WinForms) libraries in
Microsoft .NET Framework 1.1 SP1, 2.0 SP2,
3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 allow
user-assisted remote attackers to execute
arbitrary code via a crafted partial-trust
application, aka "Windows Forms Elevation of
Privilege Vulnerability." |
2015-05-13 |
9.3 |
CVE-2015-1673
MS |
microsoft
-- windows_7 |
Microsoft
Windows Vista SP2, Windows Server 2008 SP2
and R2 SP1, Windows 7 SP1, Windows 8,
Windows 8.1, Windows Server 2012 Gold and
R2, and Windows RT Gold and 8.1 allow remote
attackers to execute arbitrary code via a
crafted Journal file, aka "Windows Journal
Remote Code Execution Vulnerability," a
different vulnerability than CVE-2015-1695,
CVE-2015-1696, CVE-2015-1697, CVE-2015-1698,
and CVE-2015-1699. |
2015-05-13 |
9.3 |
CVE-2015-1675
MS |
microsoft
-- excel |
Microsoft
Office 2010 SP2, Excel 2010 SP2, PowerPoint
2010 SP2, Word 2010 SP2, Office 2013 SP1,
Excel 2013 SP1, PowerPoint 2013 SP1, Word
2013 SP1, Office 2013 RT SP1, Excel 2013 RT
SP1, PowerPoint 2013 RT SP1, Word 2013 RT
SP1, Office for Mac 2011, Excel for Mac
2011, PowerPoint for Mac 2011, Word for Mac
2011, PowerPoint Viewer, Word Automation
Services on SharePoint Server 2010 SP2 and
2013 SP1, Excel Services on SharePoint
Server 2010 SP2 and 2013 SP1, Office Web
Apps 2010 SP2, Excel Web App 2010 SP2,
Office Web Apps Server 2013 SP1, SharePoint
Foundation 2010 SP2, and SharePoint Server
2013 SP1 allow remote attackers to execute
arbitrary code via a crafted document, aka
"Microsoft Office Memory Corruption
Vulnerability." |
2015-05-13 |
9.3 |
CVE-2015-1682
MS |
microsoft
-- office |
Microsoft
Office 2007 SP3 allows remote attackers to
execute arbitrary code via a crafted
document, aka "Microsoft Office Memory
Corruption Vulnerability." |
2015-05-13 |
9.3 |
CVE-2015-1683
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 9 through 11 allows remote
attackers to execute arbitrary code or cause
a denial of service (memory corruption) via
a crafted web site, aka "Internet Explorer
Memory Corruption Vulnerability," a
different vulnerability than CVE-2015-1705. |
2015-05-13 |
9.3 |
CVE-2015-1689
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 8 and 9 allows remote
attackers to execute arbitrary code or cause
a denial of service (memory corruption) via
a crafted web site, aka "Internet Explorer
Memory Corruption Vulnerability," a
different vulnerability than CVE-2015-1712. |
2015-05-13 |
9.3 |
CVE-2015-1691
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 6 through 11 allows remote
attackers to execute arbitrary code or cause
a denial of service (memory corruption) via
a crafted web site, aka "Internet Explorer
Memory Corruption Vulnerability," a
different vulnerability than CVE-2015-1710. |
2015-05-13 |
9.3 |
CVE-2015-1694
MS |
microsoft
-- windows_7 |
Microsoft
Windows Vista SP2, Windows Server 2008 SP2
and R2 SP1, Windows 7 SP1, Windows 8,
Windows 8.1, Windows Server 2012 Gold and
R2, and Windows RT Gold and 8.1 allow remote
attackers to execute arbitrary code via a
crafted Journal file, aka "Windows Journal
Remote Code Execution Vulnerability," a
different vulnerability than CVE-2015-1675,
CVE-2015-1696, CVE-2015-1697, CVE-2015-1698,
and CVE-2015-1699. |
2015-05-13 |
9.3 |
CVE-2015-1695
MS |
microsoft
-- windows_7 |
Microsoft
Windows Vista SP2, Windows Server 2008 SP2
and R2 SP1, Windows 7 SP1, Windows 8,
Windows 8.1, Windows Server 2012 Gold and
R2, and Windows RT Gold and 8.1 allow remote
attackers to execute arbitrary code via a
crafted Journal file, aka "Windows Journal
Remote Code Execution Vulnerability," a
different vulnerability than CVE-2015-1675,
CVE-2015-1695, CVE-2015-1697, CVE-2015-1698,
and CVE-2015-1699. |
2015-05-13 |
9.3 |
CVE-2015-1696
MS |
microsoft
-- windows_7 |
Microsoft
Windows Vista SP2, Windows Server 2008 SP2
and R2 SP1, Windows 7 SP1, Windows 8,
Windows 8.1, Windows Server 2012 Gold and
R2, and Windows RT Gold and 8.1 allow remote
attackers to execute arbitrary code via a
crafted Journal file, aka "Windows Journal
Remote Code Execution Vulnerability," a
different vulnerability than CVE-2015-1675,
CVE-2015-1695, CVE-2015-1696, CVE-2015-1698,
and CVE-2015-1699. |
2015-05-13 |
9.3 |
CVE-2015-1697
MS |
microsoft
-- windows_7 |
Microsoft
Windows Vista SP2, Windows Server 2008 SP2
and R2 SP1, Windows 7 SP1, Windows 8,
Windows 8.1, Windows Server 2012 Gold and
R2, and Windows RT Gold and 8.1 allow remote
attackers to execute arbitrary code via a
crafted Journal file, aka "Windows Journal
Remote Code Execution Vulnerability," a
different vulnerability than CVE-2015-1675,
CVE-2015-1695, CVE-2015-1696, CVE-2015-1697,
and CVE-2015-1699. |
2015-05-13 |
9.3 |
CVE-2015-1698
MS |
microsoft
-- windows_7 |
Microsoft
Windows Vista SP2, Windows Server 2008 SP2
and R2 SP1, Windows 7 SP1, Windows 8,
Windows 8.1, Windows Server 2012 Gold and
R2, and Windows RT Gold and 8.1 allow remote
attackers to execute arbitrary code via a
crafted Journal file, aka "Windows Journal
Remote Code Execution Vulnerability," a
different vulnerability than CVE-2015-1675,
CVE-2015-1695, CVE-2015-1696, CVE-2015-1697,
and CVE-2015-1698. |
2015-05-13 |
9.3 |
CVE-2015-1699
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 9 through 11 allows remote
attackers to execute arbitrary code or cause
a denial of service (memory corruption) via
a crafted web site, aka "Internet Explorer
Memory Corruption Vulnerability," a
different vulnerability than CVE-2015-1689. |
2015-05-13 |
9.3 |
CVE-2015-1705
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 11 allows remote attackers
to execute arbitrary code or cause a denial
of service (memory corruption) via a crafted
web site, aka "Internet Explorer Memory
Corruption Vulnerability," a different
vulnerability than CVE-2015-1658,
CVE-2015-1711, CVE-2015-1717, and
CVE-2015-1718. |
2015-05-13 |
9.3 |
CVE-2015-1706
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 7 and 8 allows remote
attackers to execute arbitrary code or cause
a denial of service (memory corruption) via
a crafted web site, aka "Internet Explorer
Memory Corruption Vulnerability." |
2015-05-13 |
9.3 |
CVE-2015-1708
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 7 through 11 allows remote
attackers to execute arbitrary code or cause
a denial of service (memory corruption) via
a crafted web site, aka "Internet Explorer
Memory Corruption Vulnerability." |
2015-05-13 |
9.3 |
CVE-2015-1709
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 6 through 11 allows remote
attackers to execute arbitrary code or cause
a denial of service (memory corruption) via
a crafted web site, aka "Internet Explorer
Memory Corruption Vulnerability," a
different vulnerability than CVE-2015-1694. |
2015-05-13 |
9.3 |
CVE-2015-1710
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 11 allows remote attackers
to execute arbitrary code or cause a denial
of service (memory corruption) via a crafted
web site, aka "Internet Explorer Memory
Corruption Vulnerability," a different
vulnerability than CVE-2015-1658,
CVE-2015-1706, CVE-2015-1717, and
CVE-2015-1718. |
2015-05-13 |
9.3 |
CVE-2015-1711
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 8 and 9 allows remote
attackers to execute arbitrary code or cause
a denial of service (memory corruption) via
a crafted web site, aka "Internet Explorer
Memory Corruption Vulnerability," a
different vulnerability than CVE-2015-1691. |
2015-05-13 |
9.3 |
CVE-2015-1712
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 10 and 11 allows remote
attackers to execute arbitrary code or cause
a denial of service (memory corruption) via
a crafted web site, aka "Internet Explorer
Memory Corruption Vulnerability." |
2015-05-13 |
9.3 |
CVE-2015-1714
MS |
microsoft
-- silverlight |
Microsoft
Silverlight 5 before 5.1.40416.00 allows
remote attackers to bypass intended
integrity-level restrictions via a crafted
Silverlight application, aka "Microsoft
Silverlight Out of Browser Application
Vulnerability." |
2015-05-13 |
9.3 |
CVE-2015-1715
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 11 allows remote attackers
to execute arbitrary code or cause a denial
of service (memory corruption) via a crafted
web site, aka "Internet Explorer Memory
Corruption Vulnerability," a different
vulnerability than CVE-2015-1658,
CVE-2015-1706, CVE-2015-1711, and
CVE-2015-1718. |
2015-05-13 |
9.3 |
CVE-2015-1717
MS |
microsoft
-- internet_explorer |
Microsoft
Internet Explorer 11 allows remote attackers
to execute arbitrary code or cause a denial
of service (memory corruption) via a crafted
web site, aka "Internet Explorer Memory
Corruption Vulnerability," a different
vulnerability than CVE-2015-1658,
CVE-2015-1706, CVE-2015-1711, and
CVE-2015-1717. |
2015-05-13 |
9.3 |
CVE-2015-1718
MS |
mozilla
-- firefox |
Multiple
unspecified vulnerabilities in the browser
engine in Mozilla Firefox before 38.0,
Firefox ESR 31.x before 31.7, and
Thunderbird before 31.7 allow remote
attackers to cause a denial of service
(memory corruption and application crash) or
possibly execute arbitrary code via unknown
vectors. |
2015-05-14 |
7.5 |
CVE-2015-2708
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM |
mozilla
-- firefox |
Multiple
unspecified vulnerabilities in the browser
engine in Mozilla Firefox before 38.0 allow
remote attackers to cause a denial of
service (memory corruption and application
crash) or possibly execute arbitrary code
via unknown vectors. |
2015-05-14 |
7.5 |
CVE-2015-2709
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM |
mozilla
-- firefox |
The
asm.js implementation in Mozilla Firefox
before 38.0 does not properly determine heap
lengths during identification of cases in
which bounds checking may be safely skipped,
which allows remote attackers to trigger
out-of-bounds write operations and possibly
execute arbitrary code, or trigger
out-of-bounds read operations and possibly
obtain sensitive information from process
memory, via crafted JavaScript. |
2015-05-14 |
7.5 |
CVE-2015-2712
CONFIRM
CONFIRM |
mozilla
-- firefox |
Buffer
overflow in the XML parser in Mozilla
Firefox before 38.0, Firefox ESR 31.x before
31.7, and Thunderbird before 31.7 allows
remote attackers to execute arbitrary code
by providing a large amount of compressed
XML data. |
2015-05-14 |
7.5 |
CVE-2015-2716
CONFIRM
CONFIRM |
qemu --
qemu |
The
Floppy Disk Controller (FDC) in QEMU, as
used in Xen 4.5.x and earlier and KVM,
allows local guest users to cause a denial
of service (out-of-bounds write and guest
crash) or possibly execute arbitrary code
via the (1) FD_CMD_READ_ID, (2)
FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other
unspecified commands, aka VENOM. |
2015-05-13 |
7.7 |
CVE-2015-3456
CONFIRM
CONFIRM
CONFIRM
MISC
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM |
quassel-irc
-- quassel |
Quassel
before 0.12.2 does not properly
re-initialize the database session when the
PostgreSQL database is restarted, which
allows remote attackers to conduct SQL
injection attacks via a \ (backslash) in a
message. NOTE: this vulnerability exists
because of an incomplete fix for
CVE-2013-4422. |
2015-05-14 |
7.5 |
CVE-2015-3427
CONFIRM
DEBIAN |
redhat
-- network_satellite |
XML
external entity (XXE) in the RPC interface
in Spacewalk and Red Hat Network (RHN)
Satellite 5.7 and earlier allows remote
attackers to read arbitrary files and
possibly have other unspecified impact via
unknown vectors. |
2015-05-14 |
7.5 |
CVE-2014-8162
REDHAT |
sap --
customer_relationship_management |
Unspecified
vulnerability in the Business Rules
Framework (CRM-BF-BRF) in SAP CRM allows
attackers to execute arbitrary code via
unknown vectors, aka SAP Security Note
2097534. |
2015-05-12 |
7.5 |
CVE-2015-3979
MISC |
sap --
customer_relationship_management |
SQL
injection vulnerability in the Business
Rules Framework (CRM-BF-BRF) in SAP CRM
allows attackers to execute arbitrary SQL
commands via unspecified vectors, aka SAP
Security Note 2097534. |
2015-05-12 |
7.5 |
CVE-2015-3980
MISC |
Back to top
Medium Vulnerabilities
Primary
Vendor -- Product |
Description |
Published |
CVSS Score |
Source
& Patch Info |
adobe -- acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to cause a denial of service
(NULL pointer dereference) via unspecified
vectors. |
2015-05-13 |
5.0 |
CVE-2015-3047
CONFIRM |
adobe -- acrobat |
Adobe
Reader and Acrobat 10.x before 10.1.14 and
11.x before 11.0.11 on Windows and OS X
allow attackers to obtain sensitive
information from process memory via
unspecified vectors. |
2015-05-13 |
5.0 |
CVE-2015-3058
CONFIRM |
adobe -- adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow attackers
to bypass intended access restrictions and
obtain sensitive information via unspecified
vectors. |
2015-05-13 |
5.0 |
CVE-2015-3079
CONFIRM |
adobe -- adobe_air |
Race
condition in Adobe Flash Player before
13.0.0.289 and 14.x through 17.x before
17.0.0.188 on Windows and OS X and before
11.2.202.460 on Linux, Adobe AIR before
17.0.0.172, Adobe AIR SDK before 17.0.0.172,
and Adobe AIR SDK & Compiler before
17.0.0.172 allows attackers to bypass the
Internet Explorer Protected Mode protection
mechanism via unspecified vectors. |
2015-05-13 |
4.3 |
CVE-2015-3081
CONFIRM |
adobe -- adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow remote
attackers to bypass intended restrictions on
filesystem write operations via unspecified
vectors, a different vulnerability than
CVE-2015-3083 and CVE-2015-3085. |
2015-05-13 |
6.4 |
CVE-2015-3082
CONFIRM |
adobe -- adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow remote
attackers to bypass intended restrictions on
filesystem write operations via unspecified
vectors, a different vulnerability than
CVE-2015-3082 and CVE-2015-3085. |
2015-05-13 |
6.4 |
CVE-2015-3083
CONFIRM |
adobe -- adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 allow remote
attackers to bypass intended restrictions on
filesystem write operations via unspecified
vectors, a different vulnerability than
CVE-2015-3082 and CVE-2015-3083. |
2015-05-13 |
6.4 |
CVE-2015-3085
CONFIRM |
adobe -- adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 do not properly
restrict discovery of memory addresses,
which allows attackers to bypass the ASLR
protection mechanism via unspecified
vectors, a different vulnerability than
CVE-2015-3092. |
2015-05-13 |
5.0 |
CVE-2015-3091
CONFIRM |
adobe -- adobe_air |
Adobe
Flash Player before 13.0.0.289 and 14.x
through 17.x before 17.0.0.188 on Windows
and OS X and before 11.2.202.460 on Linux,
Adobe AIR before 17.0.0.172, Adobe AIR SDK
before 17.0.0.172, and Adobe AIR SDK &
Compiler before 17.0.0.172 do not properly
restrict discovery of memory addresses,
which allows attackers to bypass the ASLR
protection mechanism via unspecified
vectors, a different vulnerability than
CVE-2015-3091. |
2015-05-13 |
5.0 |
CVE-2015-3092
CONFIRM |
cisco -- webex_meetings_server |
Cross-site
scripting (XSS) vulnerability in the
administrative interface in Cisco WebEx
Meetings Server 2.5 and 2.5.0.997 allows
remote attackers to inject arbitrary web
script or HTML via a crafted URL, aka Bug ID
CSCuq86310. |
2015-05-14 |
4.3 |
CVE-2015-0634
CISCO |
cisco --
headend_digital_broadband_delivery_system |
Multiple
cross-site scripting (XSS) vulnerabilities
in dncs 7.0.0.12 in Cisco Headend Digital
Broadband Delivery System allow remote
attackers to inject arbitrary web script or
HTML via unspecified parameters in a (1) GET
or (2) POST request, aka Bug ID CSCur25604. |
2015-05-14 |
4.3 |
CVE-2015-0724
CISCO |
cisco -- security_manager |
Cross-site
scripting (XSS) vulnerability in the HTTP
module in Cisco Security Manager (CSM)
4.7(0)SP1(1) allows remote attackers to
inject arbitrary web script or HTML via a
crafted URL, aka Bug ID CSCut27789. |
2015-05-14 |
4.3 |
CVE-2015-0727
CISCO |
cisco --
secure_access_control_system |
Cross-site
scripting (XSS) vulnerability in Cisco
Access Control Server (ACS) 5.5(0.1) allows
remote attackers to inject arbitrary web
script or HTML via a crafted URL, aka Bug ID
CSCuu11002. |
2015-05-14 |
4.3 |
CVE-2015-0728
CISCO |
cisco --
email_security_appliance |
Multiple
cross-site scripting (XSS) vulnerabilities
on the Cisco Email Security Appliance (ESA)
8.5.6-106 allow remote attackers to inject
arbitrary web script or HTML via unspecified
parameters in a (1) GET or (2) POST request,
aka Bug ID CSCut87743. |
2015-05-14 |
4.3 |
CVE-2015-0734
CISCO |
clamav -- clamav |
The
upx decoder in ClamAV before 0.98.7 allows
remote attackers to cause a denial of
service (crash) via a crafted file. |
2015-05-12 |
5.0 |
CVE-2015-2170
CONFIRM
UBUNTU |
clamav -- clamav |
ClamAV
before 0.98.7 allows remote attackers to
cause a denial of service (infinite loop)
via a crafted y0da cryptor file. |
2015-05-12 |
5.0 |
CVE-2015-2221
CONFIRM
UBUNTU |
clamav -- clamav |
ClamAV
before 0.98.7 allows remote attackers to
cause a denial of service (crash) via a
crafted petite packed file. |
2015-05-12 |
5.0 |
CVE-2015-2222
CONFIRM
UBUNTU |
clamav -- clamav |
ClamAV
before 0.98.7 allows remote attackers to
cause a denial of service (infinite loop)
via a crafted xy archive file. |
2015-05-12 |
5.0 |
CVE-2015-2668
CONFIRM
UBUNTU |
digia -- qt |
Multiple
buffer overflows in the QtBase module in Qt
before 4.8.7 and 5.x before 5.4.2 allow
remote attackers to cause a denial of
service and possibly execute arbitrary code
via a crafted BMP image. |
2015-05-12 |
6.8 |
CVE-2015-1858
MLIST
FEDORA
FEDORA
FEDORA
FEDORA
FEDORA |
digia -- qt |
Multiple
buffer overflows in the QtBase module in Qt
before 4.8.7 and 5.x before 5.4.2 allow
remote attackers to cause a denial of
service and possibly execute arbitrary code
via a crafted ICO image. |
2015-05-12 |
6.8 |
CVE-2015-1859
MLIST
FEDORA
FEDORA
FEDORA
FEDORA
FEDORA |
digia -- qt |
Multiple
buffer overflows in the QtBase module in Qt
before 4.8.7 and 5.x before 5.4.2 allow
remote attackers to cause a denial of
service and possibly execute arbitrary code
via a crafted GIF image. |
2015-05-12 |
6.8 |
CVE-2015-1860
MLIST
FEDORA
FEDORA
FEDORA
FEDORA
FEDORA |
f5 --
big-ip_access_policy_manager |
The
automatic signature update functionality in
the (1) Phone Home feature in F5 BIG-IP LTM,
AAM, AFM, Analytics, APM, GTM, and Link
Controller 11.5.0 through 11.6.0, ASM 10.0.0
through 11.6.0, and PEM 11.3.0 through
11.6.0 and the (2) Call Home feature in ASM
10.0.0 through 11.6.0 and PEM 11.3.0 through
11.6.0 does not properly validate server SSL
certificates, which allows remote attackers
to conduct man-in-the-middle attacks via a
crafted certificate. |
2015-05-12 |
4.3 |
CVE-2014-9326
CONFIRM |
fedora --
pacemaker_configuration_system |
The
pcs daemon (pcsd) in PCS 0.9.137 and earlier
does not set the secure flag for a cookie in
an https session, which makes it easier for
remote attackers to capture this cookie by
intercepting its transmission within an http
session. NOTE: this issue was SPLIT per ADT2
due to different vulnerability types.
CVE-2015-3983 is for the issue with not
setting the HTTPOnly flag. |
2015-05-14 |
6.8 |
CVE-2015-1848
CONFIRM
REDHAT
REDHAT |
fedora --
pacemaker_configuration_system |
The
pcs daemon (pcsd) in PCS 0.9.137 and earlier
does not include the HTTPOnly flag in a
Set-Cookie header, which makes it easier for
remote attackers to obtain potentially
sensitive information via script access to
this cookie. NOTE: this issue was SPLIT from
CVE-2015-1848 per ADT2 due to different
vulnerability types. |
2015-05-14 |
4.3 |
CVE-2015-3983
CONFIRM
REDHAT
REDHAT |
fortinet -- fortios |
Multiple
cross-site scripting (XSS) vulnerabilities
in Fortinet FortiOS 5.2.x before 5.2.3 allow
remote attackers to inject arbitrary web
script or HTML via unspecified vectors to
the (1) user group or (2) vpn template
menus. |
2015-05-12 |
4.3 |
CVE-2014-8616
CONFIRM |
fortinet -- fortiadc-1500d |
Cross-site
scripting (XSS) vulnerability in theme login
page in Fortinet FortiADC D models before
4.2 allows remote attackers to inject
arbitrary web script or HTML via unspecified
vectors. |
2015-05-12 |
4.3 |
CVE-2014-8618
CONFIRM |
fortinet -- fortiweb |
Cross-site
scripting (XSS) vulnerability in autolearn
configuration page in Fortinet FortiWeb
5.1.2 through 5.3.4 allows remote attackers
to inject arbitrary web script or HTML via
unspecified vectors. |
2015-05-12 |
4.3 |
CVE-2014-8619
CONFIRM |
fortinet -- fortios |
Cross-site
scripting (XSS) vulnerability in sslvpn
login page in Fortinet FortiOS 5.2.x before
5.2.3 allows remote attackers to inject
arbitrary web script or HTML via unspecified
vectors. |
2015-05-12 |
4.3 |
CVE-2015-1880
CONFIRM |
fortinet --
fortianalyzer_firmware |
Cross-site
scripting (XSS) vulnerability in the
advanced dataset reports page in Fortinet
FortiAnalyzer 5.0.0 through 5.0.10 and 5.2.0
through 5.2.1 and FortiManager 5.0.3 through
5.0.10 and 5.2.0 through 5.2.1 allows remote
attackers to inject arbitrary web script or
HTML via unspecified vectors. |
2015-05-12 |
4.3 |
CVE-2015-3620
CONFIRM |
gnu -- libtasn1 |
The
_asn1_extract_der_octet function in
lib/decoding.c in GNU Libtasn1 before 4.5
allows remote attackers to cause a denial of
service (out-of-bounds heap read) via a
crafted certificate. |
2015-05-12 |
4.3 |
CVE-2015-3622
MLIST
SECTRACK
BID
MANDRIVA
FULLDISC
MISC |
gstreamer -- gstreamer |
GStreamer
before 1.4.5, as used in Mozilla Firefox
before 38.0, Firefox ESR 31.x before 31.7,
and Thunderbird before 31.7 on Linux, allows
remote attackers to cause a denial of
service (buffer over-read and application
crash) or possibly execute arbitrary code
via crafted H.264 video data in an m4v file. |
2015-05-14 |
6.8 |
CVE-2015-0797
CONFIRM
CONFIRM |
huawei -- seq_analyst |
Cross-site
scripting (XSS) vulnerability in Huawei SEQ
Analyst before V200R002C03LG0001CP0022
allows remote attackers to inject arbitrary
web script or HTML via the command XML
element in the req parameter to
flexdata.action in (1) common/, (2)
monitor/, or (3) psnpm/ or the (4) module
XML element in the req parameter to
flexdata.action in monitor/. |
2015-05-08 |
4.3 |
CVE-2015-2347
MISC
CONFIRM
FULLDISC
MISC |
kogmbh -- webodf |
Cross-site
scripting (XSS) vulnerability in WebODF
before 0.5.4 allows remote attackers to
inject arbitrary web script or HTML via a
file name. |
2015-05-08 |
4.3 |
CVE-2014-9716
CONFIRM
CONFIRM
CONFIRM |
kogmbh -- webodf |
Multiple
cross-site scripting (XSS) vulnerabilities
in WebODF before 0.5.5, as used in ownCloud,
allow remote attackers to inject arbitrary
web script or HTML via a (1) style or (2)
font name or (3) javascript or (4) data URI. |
2015-05-08 |
4.3 |
CVE-2015-3012
CONFIRM
CONFIRM
CONFIRM
CONFIRM
DEBIAN |
lenovo -- system_update |
Race
condition in Lenovo System Update (formerly
ThinkVantage System Update) before 5.06.0034
uses world-writable permissions for the
update files directory, which allows local
users to gain privileges by writing to an
update file after the signature is
validated. |
2015-05-12 |
6.9 |
CVE-2015-2234
MISC
CONFIRM
SECTRACK |
microsoft -- .net_framework |
The
Windows DirectWrite library, as used in
Microsoft .NET Framework 3.0 SP2, 3.5,
3.5.1, 4, 4.5, 4.5.1, and 4.5.2, allows
remote attackers to obtain sensitive
information from process memory via a
crafted OpenType font on a web site, aka
"OpenType Font Parsing Vulnerability." |
2015-05-13 |
4.3 |
CVE-2015-1670
MS |
microsoft -- .net_framework |
Microsoft
.NET Framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5,
4.5.1, and 4.5.2 allows remote attackers to
cause a denial of service (recursion and
performance degradation) via crafted
encrypted data in an XML document, aka ".NET
XML Decryption Denial of Service
Vulnerability." |
2015-05-13 |
5.0 |
CVE-2015-1672
MS |
microsoft -- internet_explorer |
VBScript.dll
in the Microsoft VBScript 5.6 through 5.8
engine, as used in Internet Explorer 8
through 11 and other products, allows remote
attackers to bypass the ASLR protection
mechanism via a crafted web site, aka
"VBScript ASLR Bypass." |
2015-05-13 |
4.3 |
CVE-2015-1684
MS
MS |
microsoft -- internet_explorer |
Microsoft
Internet Explorer 11 allows remote attackers
to bypass the ASLR protection mechanism via
a crafted web site, aka "Internet Explorer
ASLR Bypass." |
2015-05-13 |
4.3 |
CVE-2015-1685
MS |
microsoft -- internet_explorer |
The
Microsoft (1) VBScript 5.6 through 5.8 and
(2) JScript 5.6 through 5.8 engines, as used
in Internet Explorer 8 through 11 and other
products, allow remote attackers to bypass
the ASLR protection mechanism via a crafted
web site, aka "VBScript and JScript ASLR
Bypass." |
2015-05-13 |
4.3 |
CVE-2015-1686
MS
MS |
microsoft -- internet_explorer |
Microsoft
Internet Explorer 7 through 11 allows remote
attackers to gain privileges via a crafted
web site, aka "Internet Explorer Elevation
of Privilege Vulnerability." |
2015-05-13 |
6.8 |
CVE-2015-1688
MS |
microsoft -- internet_explorer |
Microsoft
Internet Explorer 7 through 11 allows
user-assisted remote attackers to read the
clipboard contents via crafted web script,
aka "Internet Explorer Clipboard Information
Disclosure Vulnerability." |
2015-05-13 |
4.3 |
CVE-2015-1692
MS |
microsoft --
sharepoint_foundation |
Microsoft
SharePoint Server 2007 SP3, SharePoint
Foundation 2010 SP2, SharePoint Server 2010
SP2, and SharePoint Foundation 2013 SP1
allow remote authenticated users to execute
arbitrary code via crafted page content, aka
"Microsoft SharePoint Page Content
Vulnerabilities." |
2015-05-13 |
6.0 |
CVE-2015-1700
MS |
microsoft -- windows_7 |
The
Service Control Manager (SCM) in Microsoft
Windows Server 2003 SP2, Windows Vista SP2,
Windows Server 2008 SP2 and R2 SP1, Windows
7 SP1, Windows 8, Windows 8.1, Windows
Server 2012 Gold and R2, and Windows RT Gold
and 8.1 does not properly constrain
impersonation levels, which allows local
users to gain privileges via a crafted
application, aka "Service Control Manager
Elevation of Privilege Vulnerability." |
2015-05-13 |
6.9 |
CVE-2015-1702
MS |
microsoft -- internet_explorer |
Microsoft
Internet Explorer 6 through 11 allows remote
attackers to gain privileges via a crafted
web site, aka "Internet Explorer Elevation
of Privilege Vulnerability," a different
vulnerability than CVE-2015-1704. |
2015-05-13 |
6.8 |
CVE-2015-1703
MS |
microsoft -- internet_explorer |
Microsoft
Internet Explorer 6 through 11 allows remote
attackers to gain privileges via a crafted
web site, aka "Internet Explorer Elevation
of Privilege Vulnerability," a different
vulnerability than CVE-2015-1703. |
2015-05-13 |
6.8 |
CVE-2015-1704
MS |
microsoft -- internet_explorer |
Microsoft
Internet Explorer 11 allows remote attackers
to gain privileges via a crafted web site,
aka "Internet Explorer Elevation of
Privilege Vulnerability." |
2015-05-13 |
6.8 |
CVE-2015-1713
MS |
microsoft -- windows_7 |
Schannel
in Microsoft Windows Server 2003 SP2,
Windows Vista SP2, Windows Server 2008 SP2
and R2 SP1, Windows 7 SP1, Windows 8,
Windows 8.1, Windows Server 2012 Gold and
R2, and Windows RT Gold and 8.1 does not
properly restrict Diffie-Hellman Ephemeral
(DHE) key lengths, which makes it easier for
remote attackers to defeat cryptographic
protection mechanisms via unspecified
vectors, aka "Schannel Information
Disclosure Vulnerability." |
2015-05-13 |
5.0 |
CVE-2015-1716
MS |
mozilla -- firefox |
Heap-based
buffer overflow in the SVGTextFrame class in
Mozilla Firefox before 38.0, Firefox ESR
31.x before 31.7, and Thunderbird before
31.7 allows remote attackers to execute
arbitrary code via crafted SVG graphics data
in conjunction with a crafted Cascading
Style Sheets (CSS) token sequence. |
2015-05-14 |
6.8 |
CVE-2015-2710
CONFIRM
CONFIRM |
mozilla -- firefox |
Mozilla
Firefox before 38.0 does not recognize a
referrer policy delivered by a referrer META
element in cases of context-menu navigation
and middle-click navigation, which allows
remote attackers to obtain sensitive
information by reading web-server Referer
logs that contain private data in a URL, as
demonstrated by a private path component. |
2015-05-14 |
4.3 |
CVE-2015-2711
CONFIRM
CONFIRM |
mozilla -- firefox |
Use-after-free
vulnerability in the SetBreaks function in
Mozilla Firefox before 38.0, Firefox ESR
31.x before 31.7, and Thunderbird before
31.7 allows remote attackers to execute
arbitrary code or cause a denial of service
(heap memory corruption) via a document
containing crafted text in conjunction with
a Cascading Style Sheets (CSS) token
sequence containing properties related to
vertical text. |
2015-05-14 |
6.8 |
CVE-2015-2713
CONFIRM
CONFIRM |
mozilla -- firefox |
Race
condition in the
nsThreadManager::RegisterCurrentThread
function in Mozilla Firefox before 38.0
allows remote attackers to execute arbitrary
code or cause a denial of service
(use-after-free and heap memory corruption)
by leveraging improper Media Decoder Thread
creation at the time of a shutdown. |
2015-05-14 |
6.8 |
CVE-2015-2715
CONFIRM
CONFIRM |
mozilla -- firefox |
Integer
overflow in libstagefright in Mozilla
Firefox before 38.0 allows remote attackers
to execute arbitrary code or cause a denial
of service (heap-based buffer overflow and
out-of-bounds read) via an MP4 video file
containing invalid metadata. |
2015-05-14 |
6.8 |
CVE-2015-2717
CONFIRM
CONFIRM |
mozilla -- firefox |
The
WebChannel.jsm module in Mozilla Firefox
before 38.0 allows remote attackers to
bypass the Same Origin Policy and obtain
sensitive webchannel-response data via a
crafted web site containing an IFRAME
element referencing a different web site
that is intended to read this data. |
2015-05-14 |
4.3 |
CVE-2015-2718
CONFIRM
CONFIRM |
mozilla -- firefox |
The
update implementation in Mozilla Firefox
before 38.0 on Windows does not ensure that
the pathname for updater.exe corresponds to
the application directory, which might allow
local users to gain privileges via a Trojan
horse file. |
2015-05-14 |
4.4 |
CVE-2015-2720
CONFIRM
CONFIRM |
openinfosecfoundation --
suricata |
The
DER parser in Suricata before 2.0.8 allows
remote attackers to cause a denial of
service (crash) via vectors related to
SSL/TLS certificates. |
2015-05-14 |
5.0 |
CVE-2015-0971
CONFIRM
DEBIAN |
openstack -- keystone |
OpenStack
Identity (Keystone) before 2014.1.5 and
2014.2.x before 2014.2.4 logs the
backend_argument configuration option
content, which allows remote authenticated
users to obtain passwords and other
sensitive backend information by reading the
Keystone logs. |
2015-05-12 |
4.0 |
CVE-2015-3646
CONFIRM
MLIST |
owncloud -- owncloud |
ownCloud
Server before 5.0.19, 6.x before 6.0.7, and
7.x before 7.0.5 allows remote authenticated
users to bypass the file blacklist and
upload arbitrary files via a file path with
UTF-8 encoding, as demonstrated by uploading
a .htaccess file. |
2015-05-08 |
6.0 |
CVE-2015-3013
CONFIRM
CONFIRM
DEBIAN |
sap -- netweaver_rfc_sdk |
SAP
NetWeaver RFC SDK allows attackers to obtain
sensitive information via unspecified
vectors, aka SAP Security Note 2084037. |
2015-05-12 |
5.0 |
CVE-2015-3981
MISC |
stunnel -- stunnel |
Stunnel
5.00 through 5.13, when using the redirect
option, does not redirect client connections
to the expected server after the initial
connection, which allows remote attackers to
bypass authentication. |
2015-05-13 |
5.8 |
CVE-2015-3644
CONFIRM |
thecartpress --
thecartpress_ecommerce_shopping_cart |
Multiple
cross-site scripting (XSS) vulnerabilities
in the TheCartPress eCommerce Shopping Cart
(aka The Professional WordPress eCommerce
Plugin) plugin for WordPress before 1.3.9.3
allow remote attackers to inject arbitrary
web script or HTML via the (1)
billing_firstname, (2) billing_lastname, (3)
billing_company, (4) billing_tax_id_number,
(5) billing_city, (6) billing_street, (7)
billing_street_2, (8) billing_postcode, (9)
billing_telephone_1, (10)
billing_telephone_2, (11) billing_fax, (12)
shipping_firstname, (13) shipping_lastname,
(14) shipping_company, (15)
shipping_tax_id_number, (16) shipping_city,
(17) shipping_street, (18)
shipping_street_2, (19) shipping_postcode,
(20) shipping_telephone_1, (21)
shipping_telephone_2, (22) shipping_fax to
shopping-cart/checkout/; (23) search_by
parameter in the admin/AddressesList.php
page to wp-admin/admin.php; (24) address_id,
(25) address_name, (26) firstname, (27)
lastname, (28) street, (29) city, (30)
postcode, or (31) email parameter in the
admin/AddressEdit.php page to
wp-admin/admin.php; (32) post_id or (33)
rel_type parameter in the
admin/AssignedCategoriesList.php page to
wp-admin/admin.php; or (34) post_type
parameter in the admin/CustomFieldsList.php
page to wp-admin/admin.php. |
2015-05-14 |
4.3 |
CVE-2015-3300
CONFIRM
MISC
EXPLOIT-DB
BUGTRAQ
MISC
OSVDB
OSVDB
OSVDB
OSVDB
OSVDB |
thecartpress --
thecartpress_ecommerce_shopping_cart |
Directory
traversal vulnerability in the TheCartPress
eCommerce Shopping Cart (aka The
Professional WordPress eCommerce Plugin)
plugin for WordPress before 1.3.9.3 allows
remote administrators to read arbitrary
files via a .. (dot dot) in the tcp_box_path
parameter in the checkout_editor_settings
page to wp-admin/admin.php. |
2015-05-14 |
4.0 |
CVE-2015-3301
CONFIRM
MISC
EXPLOIT-DB
BUGTRAQ
MISC
OSVDB |
thecartpress --
thecartpress_ecommerce_shopping_cart |
Cross-site
request forgery (CSRF) vulnerability in the
TheCartPress eCommerce Shopping Cart (aka
The Professional WordPress eCommerce Plugin)
plugin for WordPress before 1.3.9.3 allows
remote attackers to hijack the
authentication of administrators for
requests that conduct directory traversal
attacks via the tcp_box_path parameter in
the checkout_editor_settings page to
wp-admin/admin.php. |
2015-05-14 |
4.3 |
CVE-2015-3986
MISC
EXPLOIT-DB
CONFIRM
BUGTRAQ
MISC |
thekelleys -- dnsmasq |
The
tcp_request function in Dnsmasq before
2.73rc4 does not properly handle the return
value of the setup_reply function, which
allows remote attackers to read process
memory and cause a denial of service
(out-of-bounds read and crash) via a
malformed DNS request. |
2015-05-08 |
6.4 |
CVE-2015-3294
UBUNTU
DEBIAN
CONFIRM
MLIST
MLIST |
trend_micro -- scanmail |
Trend
Micro ScanMail for Microsoft Exchange (SMEX)
10.2 before Hot Fix Build 3318 and 11.0
before Hot Fix Build 4180 creates session
IDs for the web console using a random
number generator with predictable values,
which makes it easier for remote attackers
to bypass authentication via a brute force
attack. |
2015-05-13 |
5.0 |
CVE-2015-3326
CONFIRM |
xml-libxml_project -- xml_libxml |
The
_clone function in XML::LibXML before 2.0119
does not properly set the expand_entities
option, which allows remote attackers to
conduct XML external entity (XXE) attacks
via a crafted XML data to the (1) new or (2)
load_xml function. |
2015-05-12 |
5.0 |
CVE-2015-3451
CONFIRM
UBUNTU
MLIST
MLIST
DEBIAN
CONFIRM |
y-cam -- ycbl03 |
Y-Cam
camera models SD range YCB003, YCK003, and
YCW003; S range YCB004, YCK004, YCW004;
EyeBall YCEB03; Bullet VGA YCBL03 and
YCBLB3; Bullet HD 720 YCBLHD5; Y-cam Classic
Range YCB002, YCK002, and YCW003; and Y-cam
Original Range YCB001, YCW001, running
firmware 4.30 and earlier, allow remote
attackers to bypass authentication and
obtain sensitive information via a leading
"/./" in a request to
en/account/accedit.asp. |
2015-05-13 |
5.0 |
CVE-2014-1900
CONFIRM
MISC |
y-cam -- ycbl03 |
Y-Cam
camera models SD range YCB003, YCK003, and
YCW003; S range YCB004, YCK004, YCW004;
EyeBall YCEB03; Bullet VGA YCBL03 and
YCBLB3; Bullet HD 720 YCBLHD5; Y-cam Classic
Range YCB002, YCK002, and YCW003; and Y-cam
Original Range YCB001, YCW001, running
firmware 4.30 and earlier, allow remote
authenticated users to cause a denial of
service (reboot) via a malformed (1) path
parameter to en/store_main.asp, (2) item
parameter to en/account/accedit.asp, or (3)
emailid parameter to en/smtpclient.asp.
NOTE: this issue can be exploited without
authentication by leveraging CVE-2014-1900. |
2015-05-13 |
6.8 |
CVE-2014-1901
MISC
CONFIRM |
yiiframework -- yiiframework |
Cross-site
scripting (XSS) vulnerability in Yii
Framework before 2.0.4 allows remote
attackers to inject arbitrary web script or
HTML via vectors related to JSON, arrays,
and Internet Explorer 6 or 7. |
2015-05-13 |
4.3 |
CVE-2015-3397
CONFIRM
CONFIRM |
Back to top
Low Vulnerabilities
Primary
Vendor -- Product |
Description |
Published |
CVSS Score |
Source
& Patch Info |
microsoft -- windows_8 |
The
kernel in Microsoft Windows 8, Windows 8.1,
Windows Server 2012 Gold and R2, and Windows
RT Gold and 8.1 does not properly validate
an unspecified address, which allows local
users to bypass the KASLR protection
mechanism, and consequently discover the
cng.sys base address, via a crafted
application, aka "Windows Kernel Security
Feature Bypass Vulnerability." |
2015-05-13 |
1.9 |
CVE-2015-1674
MS |
microsoft -- windows_7 |
The
kernel-mode drivers in Microsoft Windows
Server 2003 SP2, Windows Vista SP2, Windows
Server 2008 SP2 and R2 SP1, Windows 7 SP1,
Windows 8, Windows 8.1, Windows Server 2012
Gold and R2, and Windows RT Gold and 8.1
allow local users to bypass the ASLR
protection mechanism via a crafted function
call, aka "Microsoft Windows Kernel Memory
Disclosure Vulnerability," a different
vulnerability than CVE-2015-1677,
CVE-2015-1678, CVE-2015-1679, and
CVE-2015-1680. |
2015-05-13 |
2.1 |
CVE-2015-1676
MS |
microsoft -- windows_7 |
The
kernel-mode drivers in Microsoft Windows
Server 2003 SP2, Windows Vista SP2, Windows
Server 2008 SP2 and R2 SP1, Windows 7 SP1,
Windows 8, Windows 8.1, Windows Server 2012
Gold and R2, and Windows RT Gold and 8.1
allow local users to bypass the ASLR
protection mechanism via a crafted function
call, aka "Microsoft Windows Kernel Memory
Disclosure Vulnerability," a different
vulnerability than CVE-2015-1676,
CVE-2015-1678, CVE-2015-1679, and
CVE-2015-1680. |
2015-05-13 |
2.1 |
CVE-2015-1677
MS |
microsoft -- windows_7 |
The
kernel-mode drivers in Microsoft Windows
Server 2003 SP2, Windows Vista SP2, Windows
Server 2008 SP2 and R2 SP1, Windows 7 SP1,
Windows 8, Windows 8.1, Windows Server 2012
Gold and R2, and Windows RT Gold and 8.1
allow local users to bypass the ASLR
protection mechanism via a crafted function
call, aka "Microsoft Windows Kernel Memory
Disclosure Vulnerability," a different
vulnerability than CVE-2015-1676,
CVE-2015-1677, CVE-2015-1679, and
CVE-2015-1680. |
2015-05-13 |
2.1 |
CVE-2015-1678
MS |
microsoft -- windows_7 |
The
kernel-mode drivers in Microsoft Windows
Server 2003 SP2, Windows Vista SP2, Windows
Server 2008 SP2 and R2 SP1, Windows 7 SP1,
Windows 8, Windows 8.1, Windows Server 2012
Gold and R2, and Windows RT Gold and 8.1
allow local users to bypass the ASLR
protection mechanism via a crafted function
call, aka "Microsoft Windows Kernel Memory
Disclosure Vulnerability," a different
vulnerability than CVE-2015-1676,
CVE-2015-1677, CVE-2015-1678, and
CVE-2015-1680. |
2015-05-13 |
2.1 |
CVE-2015-1679
MS |
microsoft -- windows_7 |
The
kernel-mode drivers in Microsoft Windows
Server 2003 SP2, Windows Vista SP2, Windows
Server 2008 SP2 and R2 SP1, Windows 7 SP1,
Windows 8, Windows 8.1, Windows Server 2012
Gold and R2, and Windows RT Gold and 8.1
allow local users to bypass the ASLR
protection mechanism via a crafted function
call, aka "Microsoft Windows Kernel Memory
Disclosure Vulnerability," a different
vulnerability than CVE-2015-1676,
CVE-2015-1677, CVE-2015-1678, and
CVE-2015-1679. |
2015-05-13 |
2.1 |
CVE-2015-1680
MS |
microsoft -- windows_7 |
Microsoft
Windows Vista SP2, Windows Server 2008 SP2
and R2 SP1, Windows 7 SP1, Windows 8,
Windows 8.1, Windows Server 2012 Gold and
R2, and Windows RT Gold and 8.1 allow local
users to cause a denial of service via a
crafted .msc file, aka "Microsoft Management
Console File Format Denial of Service
Vulnerability." |
2015-05-13 |
1.9 |
CVE-2015-1681
MS |
mozilla -- firefox |
Mozilla
Firefox before 38.0 on Android does not
properly restrict writing URL data to the
Android logging system, which allows
attackers to obtain sensitive information
via a crafted application that has a
required permission for reading a log, as
demonstrated by the READ_LOGS permission for
the mixed-content violation log on Android
4.0 and earlier. |
2015-05-14 |
2.1 |
CVE-2015-2714
CONFIRM
CONFIRM |
owncloud -- owncloud |
Multiple
cross-site scripting (XSS) vulnerabilities
in the contacts application in ownCloud
Server Community Edition before 5.0.19, 6.x
before 6.0.7, and 7.x before 7.0.5 allow
remote authenticated users to inject
arbitrary web script or HTML via a crafted
contact. |
2015-05-08 |
3.5 |
CVE-2015-3011
CONFIRM
DEBIAN |
sap --
sybase_unwired_platform_online_data_proxy |
SAP
Sybase Unwired Platform Online Data Proxy
allows local users to obtain usernames and
passwords via the DataVault, aka SAP
Security Note 2094830. |
2015-05-12 |
2.1 |
CVE-2015-3978
MISC
MISC |
y-cam -- ycbl03 |
Multiple
cross-site scripting (XSS) vulnerabilities
in Y-Cam camera models SD range YCB003,
YCK003, and YCW003; S range YCB004, YCK004,
YCW004; EyeBall YCEB03; Bullet VGA YCBL03
and YCBLB3; Bullet HD 720 YCBLHD5; Y-cam
Classic Range YCB002, YCK002, and YCW003;
and Y-cam Original Range YCB001, YCW001,
running firmware 4.30 and earlier, allow
remote authenticated users to inject
arbitrary web script or HTML via the (1)
SYSCONTACT parameter to form/identityApply,
as triggered using en/identity.asp; (2)
PASSWD parameter to form/accAdd, as
triggered using en/account/accedit.asp; (3)
NTPSERVER parameter to form/clockApply, as
triggered using en/clock.asp; (4) SERVER
parameter to form/smtpclientApply, as
triggered using en/smtpclient.asp; (5)
SERVER parameter to form/ftpApply, as
triggered using en/ftp.asp; or (6) SERVER
parameter to form/httpEventApply, as
triggered using en/httpevent.asp. |
2015-05-13 |
3.5 |
CVE-2014-1902
CONFIRM
MISC |
Back to top
This product is provided subject to this Notification
and this Privacy
& Use policy.
STAY CONNECTED: |
|
This email was
sent to gera...@gmail.com using GovDelivery,
on behalf of: United States Computer Emergency
Readiness Team (US-CERT) · 245 Murray Lane SW
Bldg 410 · Washington, DC 20598 · (888)
282-0870 |
|
|