Show filters
502 Total Results
Displaying 181-190 of 502
Sort by:
Attacker Value
Unknown
CVE-2015-3040
Disclosure Date: April 14, 2015 (last updated October 05, 2023)
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-0357.
0
Attacker Value
Unknown
CVE-2015-0358
Disclosure Date: April 14, 2015 (last updated October 05, 2023)
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-3039.
0
Attacker Value
Unknown
CVE-2015-0348
Disclosure Date: April 14, 2015 (last updated October 05, 2023)
Buffer overflow in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-3041
Disclosure Date: April 14, 2015 (last updated October 05, 2023)
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3042, and CVE-2015-3043.
0
Attacker Value
Unknown
CVE-2015-2808
Disclosure Date: April 01, 2015 (last updated October 05, 2023)
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
0
Attacker Value
Unknown
CVE-2014-8169
Disclosure Date: March 18, 2015 (last updated October 05, 2023)
automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
0
Attacker Value
Unknown
CVE-2015-0412
Disclosure Date: January 21, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS.
0
Attacker Value
Unknown
CVE-2015-0432
Disclosure Date: January 21, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
0
Attacker Value
Unknown
CVE-2014-6601
Disclosure Date: January 21, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
0
Attacker Value
Unknown
CVE-2015-0391
Disclosure Date: January 21, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
0