Show filters
150 Total Results
Displaying 91-100 of 150
Sort by:
Attacker Value
Unknown
CVE-2015-2568
Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.
0
Attacker Value
Unknown
CVE-2015-0505
Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
0
Attacker Value
Unknown
CVE-2015-0441
Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.
0
Attacker Value
Unknown
CVE-2015-0499
Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
0
Attacker Value
Unknown
CVE-2015-0433
Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.
0
Attacker Value
Unknown
CVE-2015-0501
Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
0
Attacker Value
Unknown
CVE-2015-2808
Disclosure Date: April 01, 2015 (last updated October 05, 2023)
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
0
Attacker Value
Unknown
CVE-2015-2348
Disclosure Date: March 30, 2015 (last updated October 05, 2023)
The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
0
Attacker Value
Unknown
CVE-2015-2301
Disclosure Date: March 30, 2015 (last updated October 05, 2023)
Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.
0
Attacker Value
Unknown
CVE-2015-2787
Disclosure Date: March 30, 2015 (last updated October 05, 2023)
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
0