Show filters
83 Total Results
Displaying 61-70 of 83
Sort by:
Attacker Value
Unknown
CVE-2015-7981
Disclosure Date: November 24, 2015 (last updated October 05, 2023)
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2015-8126
Disclosure Date: November 13, 2015 (last updated October 05, 2023)
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
0
Attacker Value
Unknown
CVE-2015-5157
Disclosure Date: August 31, 2015 (last updated February 16, 2024)
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
0
Attacker Value
Unknown
CVE-2015-5165
Disclosure Date: August 12, 2015 (last updated October 05, 2023)
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-1288
Disclosure Date: July 23, 2015 (last updated October 05, 2023)
The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.
0
Attacker Value
Unknown
CVE-2015-1279
Disclosure Date: July 23, 2015 (last updated October 05, 2023)
Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.
0
Attacker Value
Unknown
CVE-2015-1287
Disclosure Date: July 23, 2015 (last updated October 05, 2023)
Blink, as used in Google Chrome before 44.0.2403.89, enables a quirks-mode exception that limits the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to core/fetch/CSSStyleSheetResource.cpp.
0
Attacker Value
Unknown
CVE-2015-1286
Disclosure Date: July 23, 2015 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in the V8ContextNativeHandler::GetModuleSystem function in extensions/renderer/v8_context_native_handler.cc in Google Chrome before 44.0.2403.89 allows remote attackers to inject arbitrary web script or HTML by leveraging the lack of a certain V8 context restriction, aka a Blink "Universal XSS (UXSS)."
0
Attacker Value
Unknown
CVE-2015-1272
Disclosure Date: July 23, 2015 (last updated October 05, 2023)
Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc.
0
Attacker Value
Unknown
CVE-2015-1277
Disclosure Date: July 23, 2015 (last updated October 05, 2023)
Use-after-free vulnerability in the accessibility implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging lack of certain validity checks for accessibility-tree data structures.
0