Show filters
734 Total Results
Displaying 311-320 of 734
Sort by:
Attacker Value
Unknown
CVE-2015-3209
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
0
Attacker Value
Unknown
CVE-2015-3329
Disclosure Date: June 09, 2015 (last updated October 05, 2023)
Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
0
Attacker Value
Unknown
CVE-2015-2568
Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.
0
Attacker Value
Unknown
CVE-2015-0500
Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors.
0
Attacker Value
Unknown
CVE-2015-0433
Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.
0
Attacker Value
Unknown
CVE-2015-0423
Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
0
Attacker Value
Unknown
CVE-2015-2808
Disclosure Date: April 01, 2015 (last updated October 05, 2023)
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
0
Attacker Value
Unknown
CVE-2015-2301
Disclosure Date: March 30, 2015 (last updated October 05, 2023)
Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.
0
Attacker Value
Unknown
CVE-2015-2787
Disclosure Date: March 30, 2015 (last updated October 05, 2023)
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
0
Attacker Value
Unknown
CVE-2014-9674
Disclosure Date: February 08, 2015 (last updated October 05, 2023)
The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
0