ID: MITRE:29327 |
Title: Windows RPC elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:29327 CVE-2015-2370 |
Severity: High |
Description: The authentication implementation in the RPC subsystem in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not prevent DCE/RPC connection reflection, which allows local users to gain privileges via a crafted application, aka "Windows RPC Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29431 |
Title: Windows installer EoP vulnerability |
Type: Software |
Bulletins:
MITRE:29431 CVE-2015-2371 |
Severity: Medium |
Description: The Windows Installer service in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a custom action script associated with a .msi package, aka "Windows Installer EoP Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29280 |
Title: Windows DLL remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:29280 CVE-2015-2368 |
Severity: Medium |
Description: Untrusted search path vulnerability in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Windows DLL Remote Code Execution Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29388 |
Title: Win32k information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:29388 CVE-2015-2381 |
Severity: Low |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2382. | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28743 |
Title: Win32k information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28743 CVE-2015-2367 |
Severity: Low |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from uninitialized kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29132 |
Title: Win32k information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:29132 CVE-2015-2382 |
Severity: Low |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2381. | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29436 |
Title: Win32k Elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:29436 CVE-2015-2363 |
Severity: High |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29128 |
Title: Win32k elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:29128 CVE-2015-2366 |
Severity: High |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29156 |
Title: Win32k elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:29156 CVE-2015-2365 |
Severity: High |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28938 |
Title: VBScript Memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28938 CVE-2015-2372 |
Severity: High |
Description: vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." | ||||
Applies to: Microsoft VBScript 5.6 Microsoft VBScript 5.7 Microsoft VBScript 5.8 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29485 |
Title: SQL Server remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:29485 CVE-2015-1762 |
Severity: High |
Description: Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka "SQL Server Remote Code Execution Vulnerability." | ||||
Applies to: Microsoft SQL Server 2008 Microsoft SQL Server 2008 R2 Microsoft SQL Server 2012 Microsoft SQL Server 2014 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29315 |
Title: SQL Server remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:29315 CVE-2015-1763 |
Severity: High |
Description: Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 does not prevent use of uninitialized memory in certain attempts to execute virtual functions, which allows remote authenticated users to execute arbitrary code via a crafted query, aka "SQL Server Remote Code Execution Vulnerability." | ||||
Applies to: Microsoft SQL Server 2008 Microsoft SQL Server 2008 R2 Microsoft SQL Server 2012 Microsoft SQL Server 2014 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29452 |
Title: SQL Server elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:29452 CVE-2015-1761 |
Severity: Medium |
Description: Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 uses an incorrect class during casts of unspecified pointers, which allows remote authenticated users to gain privileges by leveraging certain write access, aka "SQL Server Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft SQL Server 2008 Microsoft SQL Server 2008 R2 Microsoft SQL Server 2012 Microsoft SQL Server 2014 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29392 |
Title: Remote Desktop Protocol |
Type: Software |
Bulletins:
MITRE:29392 CVE-2015-2373 |
Severity: High |
Description: The Remote Desktop Protocol (RDP) server service in Microsoft Windows 7 SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a series of crafted packets, aka "Remote Desktop Protocol (RDP) Remote Code Execution Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29493 |
Title: OpenType font driver vulnerability |
Type: Software |
Bulletins:
MITRE:29493 CVE-2015-2426 |
Severity: High |
Description: Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "OpenType Font Driver Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28990 |
Title: OLE Elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28990 CVE-2015-2416 |
Severity: Medium |
Description: OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via crafted input, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "OLE Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2417. | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29198 |
Title: OLE Elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:29198 CVE-2015-2417 |
Severity: Medium |
Description: OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via crafted input, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "OLE Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2416. | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28805 |
Title: Microsoft Office memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28805 CVE-2015-2377 |
Severity: High |
Description: Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Excel 2007 Microsoft Excel 2010 Microsoft Excel 2013 Microsoft Office Compatibility Pack |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28544 |
Title: Microsoft Office memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28544 CVE-2015-2415 |
Severity: High |
Description: Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Excel 2007 Microsoft Excel 2010 Microsoft Excel 2013 Microsoft Office Compatibility Pack |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29449 |
Title: Microsoft Office memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29449 CVE-2015-2380 |
Severity: High |
Description: Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, and Word 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Word 2007 Microsoft Word 2010 Microsoft Word 2013 Microsoft Word Viewer |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29517 |
Title: Microsoft Office memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29517 CVE-2015-2424 |
Severity: High |
Description: Microsoft PowerPoint 2007 SP3, Word 2007 SP3, PowerPoint 2010 SP2, Word 2010 SP2, PowerPoint 2013 SP1, Word 2013 SP1, and PowerPoint 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft PowerPoint 2007 Microsoft PowerPoint 2010 Microsoft PowerPoint 2013 Microsoft Word 2007 Microsoft Word 2010 Microsoft Word 2013 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29139 |
Title: Microsoft Office memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29139 CVE-2015-2375 |
Severity: Medium |
Description: Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel Viewer 2007 SP3, Excel Services on SharePoint Server 2010 SP2, and Excel Services on SharePoint Server 2013 SP1 allow remote attackers to bypass the ASLR protection mechanism via a crafted spreadsheet, aka "Microsoft Excel ASLR Bypass Vulnerability." | ||||
Applies to: Microsoft Excel 2010 Microsoft Excel 2013 Microsoft SharePoint Server 2010 Microsoft SharePoint Server 2013 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29245 |
Title: Microsoft Office memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29245 CVE-2015-2376 |
Severity: High |
Description: Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Office for Mac 2011, Excel Viewer 2007 SP3, Office Compatibility Pack SP3, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, and Excel Services on SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Excel 2007 Microsoft Excel 2010 Microsoft Excel 2013 Microsoft Excel Viewer 2007 Microsoft Office Compatibility Pack Microsoft SharePoint Server 2007 Microsoft SharePoint Server 2010 Microsoft SharePoint Server 2013 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29284 |
Title: Microsoft Office memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29284 CVE-2015-2379 |
Severity: High |
Description: Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office for Mac 2011, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Word 2007 Microsoft Word 2010 Microsoft Word 2013 Microsoft Word Viewer |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29525 |
Title: Microsoft Excel DLL remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:29525 CVE-2015-2378 |
Severity: Medium |
Description: Untrusted search path vulnerability in Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel Viewer 2007 SP3, and Office Compatibility Pack SP3 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Microsoft Excel DLL Remote Code Execution Vulnerability." | ||||
Applies to: Microsoft Excel 2007 Microsoft Excel 2010 Microsoft Excel Viewer 2007 Microsoft Office Compatibility Pack |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29316 |
Title: Jscript9 Memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29316 CVE-2015-2419 |
Severity: High |
Description: JScript 9 in Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "JScript9 Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29075 |
Title: Internet Explorer XSS filter bypass vulnerability |
Type: Web |
Bulletins:
MITRE:29075 CVE-2015-2398 |
Severity: Medium |
Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the XSS filter via a crafted attribute of an element in an HTML document, aka "Internet Explorer XSS Filter Bypass Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28804 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28804 CVE-2015-2390 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2385, CVE-2015-2397, CVE-2015-2404, CVE-2015-2406, and CVE-2015-2422. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28818 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28818 CVE-2015-1733 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2389 and CVE-2015-2411. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28834 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28834 CVE-2015-2406 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2385, CVE-2015-2390, CVE-2015-2397, CVE-2015-2404, and CVE-2015-2422. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28529 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28529 CVE-2015-2401 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1767 and CVE-2015-2408. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28614 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28614 CVE-2015-2384 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2383 and CVE-2015-2425. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29357 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29357 CVE-2015-2404 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2385, CVE-2015-2390, CVE-2015-2397, CVE-2015-2406, and CVE-2015-2422. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29360 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29360 CVE-2015-2422 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2385, CVE-2015-2390, CVE-2015-2397, CVE-2015-2404, and CVE-2015-2406. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29395 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29395 CVE-2015-2389 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1733 and CVE-2015-2411. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29414 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29414 CVE-2015-1738 |
Severity: High |
Description: Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2388. | ||||
Applies to: Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29470 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29470 CVE-2015-2414 |
Severity: Medium |
Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to obtain sensitive browsing-history information via vectors related to image caching, aka "Internet Explorer Information Disclosure Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29487 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29487 CVE-2015-2388 |
Severity: High |
Description: Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1738. | ||||
Applies to: Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29010 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29010 CVE-2015-2403 |
Severity: High |
Description: Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 8 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29015 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29015 CVE-2015-1767 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2401 and CVE-2015-2408. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29087 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29087 CVE-2015-2410 |
Severity: Medium |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to determine the existence of local files via a crafted stylesheet, aka "Internet Explorer Information Disclosure Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29159 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29159 CVE-2015-2412 |
Severity: Medium |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to read arbitrary local files via a crafted pathname, aka "Internet Explorer Information Disclosure Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29164 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29164 CVE-2015-2383 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2384 and CVE-2015-2425. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29219 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29219 CVE-2015-2411 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1733 and CVE-2015-2389. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29247 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29247 CVE-2015-2391 |
Severity: High |
Description: Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29278 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29278 CVE-2015-2385 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2390, CVE-2015-2397, CVE-2015-2404, CVE-2015-2406, and CVE-2015-2422. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29292 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29292 CVE-2015-2408 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1767 and CVE-2015-2401. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29295 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29295 CVE-2015-1729 |
Severity: Medium |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29296 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29296 CVE-2015-2425 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2383 and CVE-2015-2384. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29324 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29324 CVE-2015-2397 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2385, CVE-2015-2390, CVE-2015-2404, CVE-2015-2406, and CVE-2015-2422. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29422 |
Title: Internet Explorer information disclosure vulnerability |
Type: Web |
Bulletins:
MITRE:29422 CVE-2015-2413 |
Severity: Medium |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to determine the existence of local files via a crafted module-resource request, aka "Internet Explorer Information Disclosure Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29454 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Web |
Bulletins:
MITRE:29454 CVE-2015-2402 |
Severity: Medium |
Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29355 |
Title: Internet Explorer ASLR bypass vulnerability |
Type: Web |
Bulletins:
MITRE:29355 CVE-2015-2421 |
Severity: Medium |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29406 |
Title: Hyper-V system data structure vulnerability |
Type: Software |
Bulletins:
MITRE:29406 CVE-2015-2362 |
Severity: High |
Description: Hyper-V in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly initialize guest OS system data structures, which allows guest OS users to execute arbitrary code on the host OS by leveraging guest OS privileges, aka "Hyper-V System Data Structure Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29391 |
Title: Hyper-V buffer overflow vulnerability |
Type: Software |
Bulletins:
MITRE:29391 CVE-2015-2361 |
Severity: High |
Description: Hyper-V in Microsoft Windows 8.1 and Windows Server 2012 R2 does not properly initialize guest OS system data structures, which allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (buffer overflow) by leveraging guest OS privileges, aka "Hyper-V Buffer Overflow Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28708 |
Title: Graphics component EOP vulnerability |
Type: Software |
Bulletins:
MITRE:28708 CVE-2015-2364 |
Severity: High |
Description: The graphics component in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application that leverages an incorrect bitmap conversion, aka "Graphics Component EOP Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:28968 |
Title: Elevation of privilege vulnerability in Netlogon |
Type: Software |
Bulletins:
MITRE:28968 CVE-2015-2374 |
Severity: Low |
Description: The Netlogon service in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2 does not properly implement domain-controller communication, which allows remote attackers to discover credentials by leveraging certain PDC access and spoofing the BDC role in a PDC communication channel, aka "Elevation of Privilege Vulnerability in Netlogon." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29149 |
Title: DLL planting remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:29149 CVE-2015-2369 |
Severity: Medium |
Description: Untrusted search path vulnerability in Windows Media Device Manager in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rtf file, aka "DLL Planting Remote Code Execution Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: CVE-2015-6431 |
Title: Cisco IOS XE 16.1.1 allows remote attackers to cause a denial of service (device reload) via a packet with the 00-00-00-00-00-00 source MAC address, aka Bug ID CSCux48405. |
Type: Hardware |
Bulletins:
CVE-2015-6431 SFBID79654 |
Severity: Medium |
Description: Cisco IOS XE 16.1.1 allows remote attackers to cause a denial of service (device reload) via a packet with the 00-00-00-00-00-00 source MAC address, aka Bug ID CSCux48405. | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29418 |
Title: Buffer overflow in a "core application plug-in" for Adobe Reader 5.1 through 7.0.2 and Acrobat 5.0 through 7.0.2 |
Type: Software |
Bulletins:
MITRE:29418 CVE-2005-2470 |
Severity: High |
Description: Buffer overflow in a "core application plug-in" for Adobe Reader 5.1 through 7.0.2 and Acrobat 5.0 through 7.0.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. | ||||
Applies to: Adobe Acrobat Adobe Reader |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29332 |
Title: ATMFD.DLL Memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29332 CVE-2015-2387 |
Severity: High |
Description: ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "ATMFD.DLL Memory Corruption Vulnerability." | ||||
Applies to: |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: MITRE:29480 |
Title: Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code |
Type: Software |
Bulletins:
MITRE:29480 CVE-2006-5857 |
Severity: High |
Description: Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering. | ||||
Applies to: Adobe Acrobat Adobe Reader |
Created: 2015-12-22 |
Updated: 2024-09-07 |
ID: CVE-2015-6429 |
Title: The IKEv1 state machine in Cisco IOS 15.4 through 15.6 and IOS XE 3.15 through 3.17 allows remote attackers to cause a denial of service (IPsec connection termination) via a crafted IKEv1 packet to a tunnel endpoint, aka Bug ID CSCuw08236. |
Type: Hardware |
Bulletins:
CVE-2015-6429 |
Severity: Medium |
Description: The IKEv1 state machine in Cisco IOS 15.4 through 15.6 and IOS XE 3.15 through 3.17 allows remote attackers to cause a denial of service (IPsec connection termination) via a crafted IKEv1 packet to a tunnel endpoint, aka Bug ID CSCuw08236. | ||||
Applies to: |
Created: 2015-12-19 |
Updated: 2024-09-07 |
ID: CVE-2015-7756 |
Title: The encryption implementation in Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18... |
Type: Hardware |
Bulletins:
CVE-2015-7756 |
Severity: Medium |
Description: The encryption implementation in Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 makes it easier for remote attackers to discover the plaintext content of VPN sessions by sniffing the network for ciphertext data and conducting an unspecified decryption attack. | ||||
Applies to: |
Created: 2015-12-19 |
Updated: 2024-09-07 |
ID: CVE-2015-7755 |
Title: Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before... |
Type: Hardware |
Bulletins:
CVE-2015-7755 SFBID79626 |
Severity: High |
Description: Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session. | ||||
Applies to: |
Created: 2015-12-19 |
Updated: 2024-09-07 |
ID: CVE-2015-6425 |
Title: The WebApplications Identity Management subsystem in Cisco Unified Communications Manager 10.5(0.98000.88) allows remote attackers to cause a denial of service (subsystem outage) via invalid session tokens, aka Bug ID CSCul83786. |
Type: Hardware |
Bulletins:
CVE-2015-6425 SFBID79275 |
Severity: Medium |
Description: The WebApplications Identity Management subsystem in Cisco Unified Communications Manager 10.5(0.98000.88) allows remote attackers to cause a denial of service (subsystem outage) via invalid session tokens, aka Bug ID CSCul83786. | ||||
Applies to: Unified Communications Manager |
Created: 2015-12-16 |
Updated: 2024-09-07 |
ID: CVE-2015-6359 |
Title: The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS 15.3(3)S0.1 on ASR devices mishandles internal tables, which allows remote attackers to cause a denial of service (memory consumption or device crash) via a flood of... |
Type: Hardware |
Bulletins:
CVE-2015-6359 SFBID79200 |
Severity: Medium |
Description: The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS 15.3(3)S0.1 on ASR devices mishandles internal tables, which allows remote attackers to cause a denial of service (memory consumption or device crash) via a flood of crafted ND messages, aka Bug ID CSCup28217. | ||||
Applies to: |
Created: 2015-12-15 |
Updated: 2024-09-07 |
ID: CVE-2015-4206 |
Title: Cisco Unified Communications Manager (UCM) 8.0 through 8.6 allows remote attackers to bypass an XSS protection mechanism via a crafted parameter, aka Bug ID CSCuu15266. |
Type: Hardware |
Bulletins:
CVE-2015-4206 SFBID79196 |
Severity: Medium |
Description: Cisco Unified Communications Manager (UCM) 8.0 through 8.6 allows remote attackers to bypass an XSS protection mechanism via a crafted parameter, aka Bug ID CSCuu15266. | ||||
Applies to: Unified Communications Manager |
Created: 2015-12-15 |
Updated: 2024-09-07 |
ID: CVE-2015-7050 |
Title: WebKit in Apple iOS before 9.2 and Safari before 9.0.2 misparses content extensions, which allows remote attackers to obtain sensitive browsing-history information via a crafted web site. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7050 SFBID78722 |
Severity: Medium |
Description: WebKit in Apple iOS before 9.2 and Safari before 9.0.2 misparses content extensions, which allows remote attackers to obtain sensitive browsing-history information via a crafted web site. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-7110 |
Title: The Disk Images component in Apple OS X before 10.11.2 and tvOS before 9.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted disk image. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7110 |
Severity: Medium |
Description: The Disk Images component in Apple OS X before 10.11.2 and tvOS before 9.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted disk image. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-7080 |
Title: Siri in Apple iOS before 9.2 allows physically proximate attackers to bypass an intended client-side protection mechanism and obtain sensitive content-notification information by listening to a device in the lock-screen state. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7080 |
Severity: Low |
Description: Siri in Apple iOS before 9.2 allows physically proximate attackers to bypass an intended client-side protection mechanism and obtain sensitive content-notification information by listening to a device in the lock-screen state. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-7107 |
Title: QuickLook in Apple iOS before 9.2 and OS X before 10.11.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted iWork file. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7107 |
Severity: Medium |
Description: QuickLook in Apple iOS before 9.2 and OS X before 10.11.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted iWork file. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-7069 |
Title: Mobile Replayer in GPUTools Framework in Apple iOS before 9.2 allows attackers to execute arbitrary code in a privileged context via an app that provides a crafted pathname, a different vulnerability than CVE-2015-7070. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7069 |
Severity: High |
Description: Mobile Replayer in GPUTools Framework in Apple iOS before 9.2 allows attackers to execute arbitrary code in a privileged context via an app that provides a crafted pathname, a different vulnerability than CVE-2015-7070. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-7070 |
Title: Mobile Replayer in GPUTools Framework in Apple iOS before 9.2 allows attackers to execute arbitrary code in a privileged context via an app that provides a crafted pathname, a different vulnerability than CVE-2015-7069. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7070 |
Severity: High |
Description: Mobile Replayer in GPUTools Framework in Apple iOS before 9.2 allows attackers to execute arbitrary code in a privileged context via an app that provides a crafted pathname, a different vulnerability than CVE-2015-7069. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-7109 |
Title: IOAcceleratorFamily in Apple OS X before 10.11.2 and tvOS before 9.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7109 |
Severity: High |
Description: IOAcceleratorFamily in Apple OS X before 10.11.2 and tvOS before 9.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-7081 |
Title: iBooks in Apple iOS before 9.2 and OS X before 10.11.2 allows remote attackers to read arbitrary files via an iBooks file containing an XML external entity declaration in conjunction with an entity reference, related to an XML... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7081 |
Severity: Medium |
Description: iBooks in Apple iOS before 9.2 and OS X before 10.11.2 allows remote attackers to read arbitrary files via an iBooks file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-7037 |
Title: Directory traversal vulnerability in Mobile Backup in Photos in Apple iOS before 9.2 allows attackers to read arbitrary files via a crafted pathname. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7037 |
Severity: Medium |
Description: Directory traversal vulnerability in Mobile Backup in Photos in Apple iOS before 9.2 allows attackers to read arbitrary files via a crafted pathname. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-7094 |
Title: CFNetwork HTTPProtocol in Apple iOS before 9.2 and OS X before 10.11.2 allows man-in-the-middle attackers to bypass the HSTS protection mechanism via a crafted URL. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7094 |
Severity: Low |
Description: CFNetwork HTTPProtocol in Apple iOS before 9.2 and OS X before 10.11.2 allows man-in-the-middle attackers to bypass the HSTS protection mechanism via a crafted URL. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-7062 |
Title: Apple OS X before 10.11.2 and tvOS before 9.1 allow local users to bypass intended configuration-profile installation restrictions via unspecified vectors. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7062 |
Severity: Medium |
Description: Apple OS X before 10.11.2 and tvOS before 9.1 allow local users to bypass intended configuration-profile installation restrictions via unspecified vectors. | ||||
Applies to: |
Created: 2015-12-11 |
Updated: 2024-09-07 |
ID: CVE-2015-6623 |
Title: Wi-Fi in Android 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24872703. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6623 |
Severity: High |
Description: Wi-Fi in Android 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24872703. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6629 |
Title: Wi-Fi in Android 5.x before 5.1.1 LMY48Z allows attackers to obtain sensitive information via unspecified vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 22667667. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6629 |
Severity: Medium |
Description: Wi-Fi in Android 5.x before 5.1.1 LMY48Z allows attackers to obtain sensitive information via unspecified vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 22667667. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6622 |
Title: The Native Frameworks Library in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6622 |
Severity: Medium |
Description: The Native Frameworks Library in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23905002. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6619 |
Title: The kernel in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, aka internal bug 23520714. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6619 |
Severity: High |
Description: The kernel in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, aka internal bug 23520714. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6633 |
Title: The display drivers in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23987307. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6633 |
Severity: High |
Description: The display drivers in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23987307. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6634 |
Title: The display drivers in Android before 5.1.1 LMY48Z allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 24163261. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6634 |
Severity: High |
Description: The display drivers in Android before 5.1.1 LMY48Z allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 24163261. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6627 |
Title: The Audio component in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information via a crafted audio file, as demonstrated by obtaining Signature or SignatureOrSystem access, aka... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6627 |
Severity: Low |
Description: The Audio component in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information via a crafted audio file, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24211743. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6630 |
Title: SystemUI in Android 5.x before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to read screenshots and consequently gain privileges via a crafted application, aka internal bug 19121797. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6630 |
Severity: Medium |
Description: SystemUI in Android 5.x before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to read screenshots and consequently gain privileges via a crafted application, aka internal bug 19121797. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6621 |
Title: SystemUI in Android 5.x before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23909438. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6621 |
Severity: High |
Description: SystemUI in Android 5.x before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23909438. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6624 |
Title: System Server in Android 6.0 before 2015-12-01 allows attackers to obtain sensitive information via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23999740. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6624 |
Severity: Medium |
Description: System Server in Android 6.0 before 2015-12-01 allows attackers to obtain sensitive information via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23999740. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6625 |
Title: System Server in Android 6.0 before 2015-12-01 allows attackers to obtain sensitive information and consequently gain privileges via a crafted application, aka internal bug 23936840. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6625 |
Severity: Medium |
Description: System Server in Android 6.0 before 2015-12-01 allows attackers to obtain sensitive information and consequently gain privileges via a crafted application, aka internal bug 23936840. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6617 |
Title: Skia, as used in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23648740. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6617 |
Severity: High |
Description: Skia, as used in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23648740. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6616 |
Title: mediaserver in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 24630158 and... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6616 |
Severity: High |
Description: mediaserver in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 24630158 and 23882800, a different vulnerability than CVE-2015-8505, CVE-2015-8506, and CVE-2015-8507. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-8506 |
Title: mediaserver in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 24441553, a different... |
Type: Mobile Devices |
Bulletins:
CVE-2015-8506 |
Severity: High |
Description: mediaserver in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 24441553, a different vulnerability than CVE-2015-6616, CVE-2015-8505, and CVE-2015-8507. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-8505 |
Title: mediaserver in Android before 5.1.1 LMY48Z allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 17769851, a different vulnerability than... |
Type: Mobile Devices |
Bulletins:
CVE-2015-8505 |
Severity: High |
Description: mediaserver in Android before 5.1.1 LMY48Z allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 17769851, a different vulnerability than CVE-2015-6616, CVE-2015-8506, and CVE-2015-8507. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-8507 |
Title: mediaserver in Android 6.0 before 2015-12-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 24157524, a different vulnerability than... |
Type: Mobile Devices |
Bulletins:
CVE-2015-8507 |
Severity: High |
Description: mediaserver in Android 6.0 before 2015-12-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 24157524, a different vulnerability than CVE-2015-6616, CVE-2015-8505, and CVE-2015-8506. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6628 |
Title: Media Framework in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6628 |
Severity: Medium |
Description: Media Framework in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24074485. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6626 |
Title: libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6626 |
Severity: Medium |
Description: libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24310423. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6631 |
Title: libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6631 |
Severity: Medium |
Description: libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24623447. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6632 |
Title: libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6632 |
Severity: Medium |
Description: libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24346430. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6620 |
Title: libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bugs 24123723 and... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6620 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bugs 24123723 and 24445127. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6618 |
Title: Bluetooth in Android 4.4 and 5.x before 5.1.1 LMY48Z allows user-assisted remote attackers to execute arbitrary code by leveraging access to the local physical environment, aka internal bug 24595992. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6618 |
Severity: Medium |
Description: Bluetooth in Android 4.4 and 5.x before 5.1.1 LMY48Z allows user-assisted remote attackers to execute arbitrary code by leveraging access to the local physical environment, aka internal bug 24595992. | ||||
Applies to: |
Created: 2015-12-08 |
Updated: 2024-09-07 |
ID: CVE-2015-6783 |
Title: The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6783 SFBID78416 |
Severity: Medium |
Description: The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows attackers to bypass a signature-validation requirement via a crafted ZIP archive. | ||||
Applies to: |
Created: 2015-12-05 |
Updated: 2024-09-07 |
ID: CVE-2015-6394 |
Title: The kernel in Cisco NX-OS 5.2(9)N1(1) on Nexus 5000 devices allows local users to cause a denial of service (device crash) via crafted USB parameters, aka Bug ID CSCus89408. |
Type: Hardware |
Bulletins:
CVE-2015-6394 |
Severity: Medium |
Description: The kernel in Cisco NX-OS 5.2(9)N1(1) on Nexus 5000 devices allows local users to cause a denial of service (device crash) via crafted USB parameters, aka Bug ID CSCus89408. | ||||
Applies to: |
Created: 2015-12-04 |
Updated: 2024-09-07 |
ID: CVE-2015-6383 |
Title: Cisco IOS XE 15.4(3)S on ASR 1000 devices improperly loads software packages, which allows local users to bypass license restrictions and obtain certain root privileges by using the CLI to enter crafted filenames, aka Bug ID CSCuv93130. |
Type: Hardware |
Bulletins:
CVE-2015-6383 SFBID78521 |
Severity: High |
Description: Cisco IOS XE 15.4(3)S on ASR 1000 devices improperly loads software packages, which allows local users to bypass license restrictions and obtain certain root privileges by using the CLI to enter crafted filenames, aka Bug ID CSCuv93130. | ||||
Applies to: |
Created: 2015-12-02 |
Updated: 2024-09-07 |
ID: CVE-2015-6385 |
Title: The publish-event event-manager feature in Cisco IOS 15.5(2)S and 15.5(3)S on Cloud Services Router 1000V devices allows local users to execute arbitrary commands with root privileges by leveraging administrative access to enter crafted environment... |
Type: Hardware |
Bulletins:
CVE-2015-6385 |
Severity: High |
Description: The publish-event event-manager feature in Cisco IOS 15.5(2)S and 15.5(3)S on Cloud Services Router 1000V devices allows local users to execute arbitrary commands with root privileges by leveraging administrative access to enter crafted environment variables, aka Bug ID CSCux14943. | ||||
Applies to: |
Created: 2015-12-01 |
Updated: 2024-09-07 |
ID: CVE-2015-5787 |
Title: The kernel in Apple iOS before 8.4.1 does not properly restrict debugging features, which allows attackers to bypass background-execution limitations via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5787 |
Severity: Medium |
Description: The kernel in Apple iOS before 8.4.1 does not properly restrict debugging features, which allows attackers to bypass background-execution limitations via a crafted app. | ||||
Applies to: |
Created: 2015-11-21 |
Updated: 2024-09-07 |
ID: CVE-2015-7036 |
Title: The fts3_tokenizer function in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a SQL command that triggers an API... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7036 |
Severity: High |
Description: The fts3_tokenizer function in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a SQL command that triggers an API call with a crafted pointer value in the second argument. | ||||
Applies to: |
Created: 2015-11-21 |
Updated: 2024-09-07 |
ID: CVE-2015-6375 |
Title: The debug-logging (aka debug cns) feature in Cisco Networking Services (CNS) for IOS 15.2(2)E3 allows local users to obtain sensitive information by reading an unspecified file, aka Bug ID CSCux18010. |
Type: Hardware |
Bulletins:
CVE-2015-6375 SFBID77676 |
Severity: Low |
Description: The debug-logging (aka debug cns) feature in Cisco Networking Services (CNS) for IOS 15.2(2)E3 allows local users to obtain sensitive information by reading an unspecified file, aka Bug ID CSCux18010. | ||||
Applies to: |
Created: 2015-11-21 |
Updated: 2024-09-07 |
ID: CVE-2015-5859 |
Title: The CFNetwork HTTPProtocol component in Apple iOS before 9 and OS X before 10.11 does not properly recognize the HSTS preload list during a Safari private-browsing session, which makes it easier for remote attackers to obtain... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5859 |
Severity: Medium |
Description: The CFNetwork HTTPProtocol component in Apple iOS before 9 and OS X before 10.11 does not properly recognize the HSTS preload list during a Safari private-browsing session, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. | ||||
Applies to: |
Created: 2015-11-21 |
Updated: 2024-09-07 |
ID: CVE-2015-6365 |
Title: Cisco IOS 15.2(04)M and 15.4(03)M lets physical-interface ACLs supersede virtual PPP interface ACLs, which allows remote authenticated users to bypass intended network-traffic restrictions in opportunistic circumstances by using PPP, aka Bug ID... |
Type: Hardware |
Bulletins:
CVE-2015-6365 |
Severity: Medium |
Description: Cisco IOS 15.2(04)M and 15.4(03)M lets physical-interface ACLs supersede virtual PPP interface ACLs, which allows remote authenticated users to bypass intended network-traffic restrictions in opportunistic circumstances by using PPP, aka Bug ID CSCur61303. | ||||
Applies to: |
Created: 2015-11-13 |
Updated: 2024-09-07 |
ID: CVE-2015-6366 |
Title: Cisco IOS 15.2(04)M6 and 15.4(03)S lets physical-interface ACLs supersede tunnel-interface ACLs, which allows remote attackers to bypass intended network-traffic restrictions in opportunistic circumstances by using a tunnel, aka Bug ID CSCur01042. |
Type: Hardware |
Bulletins:
CVE-2015-6366 |
Severity: Medium |
Description: Cisco IOS 15.2(04)M6 and 15.4(03)S lets physical-interface ACLs supersede tunnel-interface ACLs, which allows remote attackers to bypass intended network-traffic restrictions in opportunistic circumstances by using a tunnel, aka Bug ID CSCur01042. | ||||
Applies to: |
Created: 2015-11-12 |
Updated: 2024-09-07 |
ID: CVE-2015-6614 |
Title: Telephony in Android 5.x before 5.1.1 LMY48X allows attackers to gain privileges, and consequently bypass intended network-interface restrictions, perform expensive data transfers, or cause a denial of service (call-reception outage... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6614 |
Severity: Medium |
Description: Telephony in Android 5.x before 5.1.1 LMY48X allows attackers to gain privileges, and consequently bypass intended network-interface restrictions, perform expensive data transfers, or cause a denial of service (call-reception outage or mute manipulation), via a crafted application, aka internal bug 21900139. | ||||
Applies to: |
Created: 2015-11-03 |
Updated: 2024-09-07 |
ID: CVE-2015-6611 |
Title: mediaserver in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, aka internal bugs... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6611 |
Severity: Medium |
Description: mediaserver in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, aka internal bugs 23905951, 23912202, 23953967, 23696300, 23600291, 23756261, 23541506, 23284974, 23542351, and 23542352, a different vulnerability than CVE-2015-8074. | ||||
Applies to: |
Created: 2015-11-03 |
Updated: 2024-09-07 |
ID: CVE-2015-8074 |
Title: mediaserver in Android before 5.1.1 LMY48X allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, aka internal bugs 23540907 and 23515142, a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-8074 |
Severity: Medium |
Description: mediaserver in Android before 5.1.1 LMY48X allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, aka internal bugs 23540907 and 23515142, a different vulnerability than CVE-2015-6611. | ||||
Applies to: |
Created: 2015-11-03 |
Updated: 2024-09-07 |
ID: CVE-2015-6608 |
Title: mediaserver in Android 5.x before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 19779574,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6608 |
Severity: High |
Description: mediaserver in Android 5.x before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 19779574, 23680780, 23876444, and 23658148, a different vulnerability than CVE-2015-8072 and CVE-2015-8073. | ||||
Applies to: |
Created: 2015-11-03 |
Updated: 2024-09-07 |
ID: CVE-2015-8072 |
Title: mediaserver in Android 4.4 through 5.x before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug... |
Type: Mobile Devices |
Bulletins:
CVE-2015-8072 |
Severity: High |
Description: mediaserver in Android 4.4 through 5.x before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23881715, a different vulnerability than CVE-2015-6608 and CVE-2015-8073. | ||||
Applies to: |
Created: 2015-11-03 |
Updated: 2024-09-07 |
ID: CVE-2015-8073 |
Title: mediaserver in Android 4.4 and 5.1 before 5.1.1 LMY48X allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 14388161, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-8073 |
Severity: High |
Description: mediaserver in Android 4.4 and 5.1 before 5.1.1 LMY48X allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 14388161, a different vulnerability than CVE-2015-6608 and CVE-2015-8072. | ||||
Applies to: |
Created: 2015-11-03 |
Updated: 2024-09-07 |
ID: CVE-2015-6609 |
Title: libutils in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted audio file, aka internal bug 22953624. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6609 |
Severity: High |
Description: libutils in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted audio file, aka internal bug 22953624. | ||||
Applies to: |
Created: 2015-11-03 |
Updated: 2024-09-07 |
ID: CVE-2015-6610 |
Title: libstagefright in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows attackers to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka internal bug 23707088. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6610 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows attackers to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka internal bug 23707088. | ||||
Applies to: |
Created: 2015-11-03 |
Updated: 2024-09-07 |
ID: CVE-2015-6612 |
Title: libmedia in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows attackers to gain privileges via a crafted application, aka internal bug 23540426. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6612 |
Severity: High |
Description: libmedia in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows attackers to gain privileges via a crafted application, aka internal bug 23540426. | ||||
Applies to: |
Created: 2015-11-03 |
Updated: 2024-09-07 |
ID: CVE-2015-6613 |
Title: Bluetooth in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows attackers to send commands to a debugging port, and consequently gain privileges, via a crafted application, as demonstrated by obtaining Signature or... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6613 |
Severity: Medium |
Description: Bluetooth in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows attackers to send commands to a debugging port, and consequently gain privileges, via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24371736. | ||||
Applies to: |
Created: 2015-11-03 |
Updated: 2024-09-07 |
ID: CVE-2015-6343 |
Title: The SIP implementation in Cisco IOS 15.5(3)M on Cisco Unified Border Element (CUBE) devices allows remote attackers to cause a denial of service via crafted SIP messages, aka Bug ID CSCuv79202. |
Type: Hardware |
Bulletins:
CVE-2015-6343 |
Severity: Medium |
Description: The SIP implementation in Cisco IOS 15.5(3)M on Cisco Unified Border Element (CUBE) devices allows remote attackers to cause a denial of service via crafted SIP messages, aka Bug ID CSCuv79202. | ||||
Applies to: |
Created: 2015-10-31 |
Updated: 2024-09-07 |
ID: CVE-2015-6341 |
Title: The Web Management GUI on Cisco Wireless LAN Controller (WLC) devices with software 7.4(140.0) and 8.0(120.0) allows remote attackers to cause a denial of service (client disconnection) via unspecified vectors, aka Bug ID CSCuw10610. |
Type: Hardware |
Bulletins:
CVE-2015-6341 |
Severity: Medium |
Description: The Web Management GUI on Cisco Wireless LAN Controller (WLC) devices with software 7.4(140.0) and 8.0(120.0) allows remote attackers to cause a denial of service (client disconnection) via unspecified vectors, aka Bug ID CSCuw10610. | ||||
Applies to: |
Created: 2015-10-24 |
Updated: 2024-09-07 |
ID: CVE-2015-7013 |
Title: WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7013 SFBID77264 |
Severity: Medium |
Description: WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-3 and APPLE-SA-2015-10-21-5. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-5928 |
Title: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5928 SFBID77267 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-5929 |
Title: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5929 SFBID77267 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-5930 |
Title: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5930 SFBID77267 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7002 |
Title: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7002 SFBID77267 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7012 |
Title: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7012 SFBID77267 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7014 |
Title: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7014 SFBID77267 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6981 |
Title: WebKit, as used in Apple iOS before 9.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6981 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6982 |
Title: WebKit, as used in Apple iOS before 9.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6982 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7005 |
Title: WebKit, as used in Apple iOS before 9.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7005 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7022 |
Title: The Telephony subsystem in Apple iOS before 9.1 allows attackers to obtain sensitive call-status information via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7022 SFBID77268 |
Severity: Medium |
Description: The Telephony subsystem in Apple iOS before 9.1 allows attackers to obtain sensitive call-status information via a crafted app. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-5924 |
Title: The OpenGL implementation in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5924 SFBID77263 |
Severity: Medium |
Description: The OpenGL implementation in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6999 |
Title: The OCSP client in Apple iOS before 9.1 does not check for certificate expiry, which allows remote attackers to spoof a valid certificate by leveraging access to a revoked certificate. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6999 SFBID77268 |
Severity: Medium |
Description: The OCSP client in Apple iOS before 9.1 does not check for certificate expiry, which allows remote attackers to spoof a valid certificate by leveraging access to a revoked certificate. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6994 |
Title: The kernel in Apple iOS before 9.1 and OS X before 10.11.1 mishandles reuse of virtual memory, which allows attackers to cause a denial of service via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6994 SFBID77263 |
Severity: High |
Description: The kernel in Apple iOS before 9.1 and OS X before 10.11.1 mishandles reuse of virtual memory, which allows attackers to cause a denial of service via a crafted app. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6988 |
Title: The kernel in Apple iOS before 9.1 and OS X before 10.11.1 does not initialize an unspecified data structure, which allows remote attackers to execute arbitrary code via vectors involving an unknown network-connectivity requirement. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6988 SFBID77263 |
Severity: High |
Description: The kernel in Apple iOS before 9.1 and OS X before 10.11.1 does not initialize an unspecified data structure, which allows remote attackers to execute arbitrary code via vectors involving an unknown network-connectivity requirement. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7004 |
Title: The kernel in Apple iOS before 9.1 allows attackers to cause a denial of service via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7004 SFBID77268 |
Severity: High |
Description: The kernel in Apple iOS before 9.1 allows attackers to cause a denial of service via a crafted app. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6995 |
Title: The Disk Images component in Apple iOS before 9.1 and OS X before 10.11.1 misparses images, which allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6995 SFBID77263 |
Severity: Medium |
Description: The Disk Images component in Apple iOS before 9.1 and OS X before 10.11.1 misparses images, which allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted app. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-5940 |
Title: The Accelerate Framework component in Apple iOS before 9.1 and OS X before 10.11.1, when multi-threading is enabled, omits certain validation and locking steps, which allows remote attackers to execute arbitrary code or cause a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5940 SFBID77263 |
Severity: Medium |
Description: The Accelerate Framework component in Apple iOS before 9.1 and OS X before 10.11.1, when multi-threading is enabled, omits certain validation and locking steps, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7000 |
Title: Notification Center in Apple iOS before 9.1 mishandles changes to "Show on Lock Screen" settings, which allows physically proximate attackers to obtain sensitive information by looking for a (1) Phone or (2) Messages notification on... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7000 SFBID77268 |
Severity: Low |
Description: Notification Center in Apple iOS before 9.1 mishandles changes to "Show on Lock Screen" settings, which allows physically proximate attackers to obtain sensitive information by looking for a (1) Phone or (2) Messages notification on the lock screen soon after a setting was disabled. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6976 |
Title: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6977,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6976 SFBID77263 |
Severity: Medium |
Description: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6991, CVE-2015-6993, CVE-2015-7008, CVE-2015-7009, CVE-2015-7010, and CVE-2015-7018. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6977 |
Title: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6977 SFBID77263 |
Severity: Medium |
Description: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6978, CVE-2015-6990, CVE-2015-6991, CVE-2015-6993, CVE-2015-7008, CVE-2015-7009, CVE-2015-7010, and CVE-2015-7018. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6990 |
Title: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6990 SFBID77263 |
Severity: Medium |
Description: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6991, CVE-2015-6993, CVE-2015-7008, CVE-2015-7009, CVE-2015-7010, and CVE-2015-7018. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6991 |
Title: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6991 SFBID77263 |
Severity: Medium |
Description: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6993, CVE-2015-7008, CVE-2015-7009, CVE-2015-7010, and CVE-2015-7018. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6993 |
Title: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6993 SFBID77263 |
Severity: Medium |
Description: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6991, CVE-2015-7008, CVE-2015-7009, CVE-2015-7010, and CVE-2015-7018. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7008 |
Title: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7008 SFBID77263 |
Severity: Medium |
Description: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6991, CVE-2015-6993, CVE-2015-7009, CVE-2015-7010, and CVE-2015-7018. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7009 |
Title: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7009 SFBID77263 |
Severity: Medium |
Description: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6991, CVE-2015-6993, CVE-2015-7008, CVE-2015-7010, and CVE-2015-7018. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7010 |
Title: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7010 SFBID77263 |
Severity: Medium |
Description: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6991, CVE-2015-6993, CVE-2015-7008, CVE-2015-7009, and CVE-2015-7018. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7018 |
Title: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7018 SFBID77263 |
Severity: Medium |
Description: FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6991, CVE-2015-6993, CVE-2015-7008, CVE-2015-7009, and CVE-2015-7010. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6983 |
Title: Double free vulnerability in Apple iOS before 9.1 and OS X before 10.11.1 allows attackers to write to arbitrary files via a crafted app that accesses AtomicBufferedFile descriptors. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6983 SFBID77263 |
Severity: High |
Description: Double free vulnerability in Apple iOS before 9.1 and OS X before 10.11.1 allows attackers to write to arbitrary files via a crafted app that accesses AtomicBufferedFile descriptors. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6975 |
Title: CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6975 |
Severity: High |
Description: CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6992 and CVE-2015-7017. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6992 |
Title: CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6992 |
Severity: High |
Description: CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6975 and CVE-2015-7017. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7017 |
Title: CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7017 |
Severity: High |
Description: CoreText in Apple iOS before 9.1, OS X before 10.11.1, and iTunes before 12.3.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6975 and CVE-2015-6992. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-6986 |
Title: com.apple.driver.AppleVXD393 in the Graphics Driver subsystem in Apple iOS before 9.1 allows attackers to execute arbitrary code via a crafted app that leverages an unspecified "type confusion." |
Type: Mobile Devices |
Bulletins:
CVE-2015-6986 SFBID77268 |
Severity: High |
Description: com.apple.driver.AppleVXD393 in the Graphics Driver subsystem in Apple iOS before 9.1 allows attackers to execute arbitrary code via a crafted app that leverages an unspecified "type confusion." | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7023 |
Title: CFNetwork in Apple iOS before 9.1 and OS X before 10.11.1 does not properly consider the uppercase-versus-lowercase distinction during cookie parsing, which allows remote web servers to overwrite cookies via unspecified vectors. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7023 SFBID77263 |
Severity: Medium |
Description: CFNetwork in Apple iOS before 9.1 and OS X before 10.11.1 does not properly consider the uppercase-versus-lowercase distinction during cookie parsing, which allows remote web servers to overwrite cookies via unspecified vectors. | ||||
Applies to: |
Created: 2015-10-23 |
Updated: 2024-09-07 |
ID: CVE-2015-7752 |
Title: The SSH server in Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R8, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5,... |
Type: Hardware |
Bulletins:
CVE-2015-7752 |
Severity: High |
Description: The SSH server in Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R8, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X53 before 14.1X53-D25, 14.2 before 14.2R3, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D20 allows remote attackers to cause a denial of service (CPU consumption) via unspecified SSH traffic. | ||||
Applies to: |
Created: 2015-10-19 |
Updated: 2024-09-07 |
ID: CVE-2015-7749 |
Title: The PFE daemon in Juniper vSRX virtual firewalls with Junos OS before 15.1X49-D20 allows remote attackers to cause a denial of service via an unspecified connection request to the "host-OS." |
Type: Hardware |
Bulletins:
CVE-2015-7749 |
Severity: High |
Description: The PFE daemon in Juniper vSRX virtual firewalls with Junos OS before 15.1X49-D20 allows remote attackers to cause a denial of service via an unspecified connection request to the "host-OS." | ||||
Applies to: |
Created: 2015-10-19 |
Updated: 2024-09-07 |
ID: CVE-2015-7750 |
Title: The L2TP packet processing functionality in Juniper Netscreen and ScreenOS Firewall products with ScreenOS before 6.3.0r13-dnd1, 6.3.0r14 through 6.3.0r18 before 6.3.0r18-dnc1, and 6.3.0r19 allows remote attackers to cause a denial of service via a... |
Type: Hardware |
Bulletins:
CVE-2015-7750 |
Severity: Medium |
Description: The L2TP packet processing functionality in Juniper Netscreen and ScreenOS Firewall products with ScreenOS before 6.3.0r13-dnd1, 6.3.0r14 through 6.3.0r18 before 6.3.0r18-dnc1, and 6.3.0r19 allows remote attackers to cause a denial of service via a crafted L2TP packet. | ||||
Applies to: |
Created: 2015-10-19 |
Updated: 2024-09-07 |
ID: CVE-2015-7751 |
Title: Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X50 before... |
Type: Hardware |
Bulletins:
CVE-2015-7751 |
Severity: Medium |
Description: Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X50 before 14.1X50-D105, 14.1X51 before 14.1X51-D70, 14.1X53 before 14.1X53-D25, 14.1X55 before 14.1X55-D20, 14.2 before 14.2R1, 15.1 before 15.1F2 or 15.1R1, and 15.1X49 before 15.1X49-D10 does not require a password for the root user when pam.conf is "corrupted," which allows local users to gain root privileges by modifying the file. | ||||
Applies to: |
Created: 2015-10-19 |
Updated: 2024-09-07 |
ID: CVE-2015-7748 |
Title: Juniper chassis with Trio (Trinity) chipset line cards and Junos OS 13.3 before 13.3R8, 14.1 before 14.1R6, 14.2 before 14.2R5, and 15.1 before 15.1R2 allow remote attackers to cause a denial of service (MPC line card crash) via a crafted uBFD packet. |
Type: Hardware |
Bulletins:
CVE-2015-7748 SFBID101103 |
Severity: Medium |
Description: Juniper chassis with Trio (Trinity) chipset line cards and Junos OS 13.3 before 13.3R8, 14.1 before 14.1R6, 14.2 before 14.2R5, and 15.1 before 15.1R2 allow remote attackers to cause a denial of service (MPC line card crash) via a crafted uBFD packet. | ||||
Applies to: |
Created: 2015-10-19 |
Updated: 2024-09-07 |
ID: CVE-2014-6449 |
Title: Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R8, 13.3 before 13.3R7, 14.1 before 14.1R5, and 14.2 before 14.2R1 do not properly handle... |
Type: Hardware |
Bulletins:
CVE-2014-6449 |
Severity: Medium |
Description: Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R8, 13.3 before 13.3R7, 14.1 before 14.1R5, and 14.2 before 14.2R1 do not properly handle TCP packet reassembly, which allows remote attackers to cause a denial of service (buffer consumption) via a crafted sequence of packets "destined to the device." | ||||
Applies to: |
Created: 2015-10-16 |
Updated: 2024-09-07 |
ID: CVE-2014-6450 |
Title: Juniper Junos OS before 11.4R12-S4, 12.1X44 before 12.1X44-D41, 12.1X46 before 12.1X46-D26, 12.1X47 before 12.1X47-D11/D15, 12.2 before 12.2R9, 12.2X50 before 12.2X50-D70, 12.3 before 12.3R8, 12.3X48 before 12.3X48-D10, 12.3X50 before 12.3X50-D42,... |
Type: Hardware |
Bulletins:
CVE-2014-6450 |
Severity: High |
Description: Juniper Junos OS before 11.4R12-S4, 12.1X44 before 12.1X44-D41, 12.1X46 before 12.1X46-D26, 12.1X47 before 12.1X47-D11/D15, 12.2 before 12.2R9, 12.2X50 before 12.2X50-D70, 12.3 before 12.3R8, 12.3X48 before 12.3X48-D10, 12.3X50 before 12.3X50-D42, 13.1 before 13.1R4-S3, 13.1X49 before 13.1X49-D42, 13.1X50 before 13.1X50-D30, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D26, 13.2X52 before 13.2X52-D15, 13.3 before 13.3R3-S3, 14.1 before 14.1R3, 14.2 before 14.2R1, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D10, when configured for IPv6, allow remote attackers to cause a denial of service (mbuf chain corruption and kernel panic) via crafted IPv6 packets. | ||||
Applies to: |
Created: 2015-10-16 |
Updated: 2024-09-07 |
ID: CVE-2014-6451 |
Title: J-Web in Juniper vSRX virtual firewalls with Junos OS before 15.1X49-D20 allows remote attackers to cause a denial of service (system reboot) via unspecified vectors. |
Type: Hardware |
Bulletins:
CVE-2014-6451 |
Severity: High |
Description: J-Web in Juniper vSRX virtual firewalls with Junos OS before 15.1X49-D20 allows remote attackers to cause a denial of service (system reboot) via unspecified vectors. | ||||
Applies to: |
Created: 2015-10-16 |
Updated: 2024-09-07 |
ID: CVE-2015-6263 |
Title: The RADIUS client implementation in Cisco IOS 15.4(3)M2.2, when a shared RADIUS secret is configured, allows remote RADIUS servers to cause a denial of service (device reload) via malformed answers, aka Bug ID CSCuu59324. |
Type: Hardware |
Bulletins:
CVE-2015-6263 |
Severity: Medium |
Description: The RADIUS client implementation in Cisco IOS 15.4(3)M2.2, when a shared RADIUS secret is configured, allows remote RADIUS servers to cause a denial of service (device reload) via malformed answers, aka Bug ID CSCuu59324. | ||||
Applies to: |
Created: 2015-10-11 |
Updated: 2024-09-07 |
ID: CVE-2015-5923 |
Title: Apple iOS before 9.0.2 does not properly restrict the options available on the lock screen, which allows physically proximate attackers to read contact data or view photos via unspecified vectors. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5923 |
Severity: Low |
Description: Apple iOS before 9.0.2 does not properly restrict the options available on the lock screen, which allows physically proximate attackers to read contact data or view photos via unspecified vectors. | ||||
Applies to: |
Created: 2015-10-09 |
Updated: 2024-09-07 |
ID: CVE-2015-6311 |
Title: Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0), 7.3(101.0), and 7.4(1.19) allow remote attackers to cause a denial of service (device outage) by sending malformed 802.11i management data to a managed access point, aka Bug ID... |
Type: Hardware |
Bulletins:
CVE-2015-6311 |
Severity: Medium |
Description: Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0), 7.3(101.0), and 7.4(1.19) allow remote attackers to cause a denial of service (device outage) by sending malformed 802.11i management data to a managed access point, aka Bug ID CSCub65236. | ||||
Applies to: |
Created: 2015-10-08 |
Updated: 2024-09-07 |
ID: CVE-2015-3874 |
Title: The Sonivox components in Android before 5.1.1 LMY48T allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 23335715, 23307276, and 23286323. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3874 |
Severity: High |
Description: The Sonivox components in Android before 5.1.1 LMY48T allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 23335715, 23307276, and 23286323. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-6606 |
Title: The Secure Element Evaluation Kit (aka SEEK or SmartCard API) plugin in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6606 |
Severity: High |
Description: The Secure Element Evaluation Kit (aka SEEK or SmartCard API) plugin in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 22301786. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3865 |
Title: The Runtime subsystem in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23050463. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3865 |
Severity: High |
Description: The Runtime subsystem in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23050463. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3877 |
Title: Skia, as used in Android before 5.1.1 LMY48T, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 20723696. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3877 |
Severity: High |
Description: Skia, as used in Android before 5.1.1 LMY48T, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 20723696. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-6596 |
Title: mediaserver in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, aka internal bugs 20731946 and 20719651, a different vulnerability than CVE-2015-7717. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6596 |
Severity: High |
Description: mediaserver in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, aka internal bugs 20731946 and 20719651, a different vulnerability than CVE-2015-7717. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-6605 |
Title: mediaserver in Android before 5.1.1 LMY48T allows attackers to cause a denial of service (process crash) via unspecified vectors, aka internal bugs 20915134 and 23142203, a different vulnerability than CVE-2015-7718. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6605 |
Severity: Medium |
Description: mediaserver in Android before 5.1.1 LMY48T allows attackers to cause a denial of service (process crash) via unspecified vectors, aka internal bugs 20915134 and 23142203, a different vulnerability than CVE-2015-7718. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3862 |
Title: mediaserver in Android before 5.1.1 LMY48T allows attackers to cause a denial of service (process crash) via unspecified vectors, aka internal bug 22954006. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3862 |
Severity: Medium |
Description: mediaserver in Android before 5.1.1 LMY48T allows attackers to cause a denial of service (process crash) via unspecified vectors, aka internal bug 22954006. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-7717 |
Title: mediaserver in Android 5.x before 5.1.1 LMY48T and 6.0 before 2015-10-01 allows attackers to gain privileges via a crafted application, aka internal bug 19573085, a different vulnerability than CVE-2015-6596. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7717 |
Severity: High |
Description: mediaserver in Android 5.x before 5.1.1 LMY48T and 6.0 before 2015-10-01 allows attackers to gain privileges via a crafted application, aka internal bug 19573085, a different vulnerability than CVE-2015-6596. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-7718 |
Title: mediaserver in Android 5.x before 5.1.1 LMY48T and 6.0 before 2015-10-01 allows attackers to cause a denial of service (process crash) via unspecified vectors, aka internal bug 22278703, a different vulnerability than CVE-2015-6605. |
Type: Mobile Devices |
Bulletins:
CVE-2015-7718 |
Severity: Medium |
Description: mediaserver in Android 5.x before 5.1.1 LMY48T and 6.0 before 2015-10-01 allows attackers to cause a denial of service (process crash) via unspecified vectors, aka internal bug 22278703, a different vulnerability than CVE-2015-6605. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3878 |
Title: Media Projection in Android 5.x before 5.1.1 LMY48T and 6.0 before 2015-10-01 allows attackers to bypass an intended screen-recording warning feature and obtain sensitive screen-snapshot information via a crafted application that... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3878 |
Severity: Medium |
Description: Media Projection in Android 5.x before 5.1.1 LMY48T and 6.0 before 2015-10-01 allows attackers to bypass an intended screen-recording warning feature and obtain sensitive screen-snapshot information via a crafted application that references a long application name, aka internal bug 23345192. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3879 |
Title: Media Player Framework in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, aka internal bug 23223325. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3879 |
Severity: High |
Description: Media Player Framework in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, aka internal bug 23223325. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3875 |
Title: libutils in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted audio file, aka internal bug 22952485. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3875 |
Severity: High |
Description: libutils in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted audio file, aka internal bug 22952485. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3873 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 23016072, 23248776, 23247055, 22845824,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3873 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 23016072, 23248776, 23247055, 22845824, 22008959, 21814993, 21048776, 20718524, 20674674, 22388975, 20674086, 21443020, and 22077698, a different vulnerability than CVE-2015-7716. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-6599 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23416608. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6599 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23416608. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3872 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23346388. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3872 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23346388. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-6598 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23306638. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6598 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23306638. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3868 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23270724. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3868 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23270724. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-6603 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23227354. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6603 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23227354. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3867 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23213430. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3867 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23213430. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-6604 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23129786. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6604 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23129786. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3869 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23036083. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3869 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23036083. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3871 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23031033. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3871 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23031033. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-6601 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 22935234. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6601 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 22935234. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-6600 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 22882938. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6600 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 22882938. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3870 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 22771132. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3870 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 22771132. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3823 |
Title: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 21335999. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3823 |
Severity: High |
Description: libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 21335999. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-7716 |
Title: libstagefright in Android 5.x before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 20721050, a different vulnerability than... |
Type: Mobile Devices |
Bulletins:
CVE-2015-7716 |
Severity: High |
Description: libstagefright in Android 5.x before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 20721050, a different vulnerability than CVE-2015-3873. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-3847 |
Title: Bluetooth in Android before 5.1.1 LMY48T allows attackers to remove stored SMS messages via a crafted application, aka internal bug 22343270. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3847 |
Severity: Medium |
Description: Bluetooth in Android before 5.1.1 LMY48T allows attackers to remove stored SMS messages via a crafted application, aka internal bug 22343270. | ||||
Applies to: |
Created: 2015-10-06 |
Updated: 2024-09-07 |
ID: CVE-2015-6308 |
Title: Cisco NX-OS 6.0(2)U6(0.46) on N3K devices allows remote authenticated users to cause a denial of service (temporary SNMP outage) via an SNMP request for an OID that does not exist, aka Bug ID CSCuw36684. |
Type: Hardware |
Bulletins:
CVE-2015-6308 |
Severity: Medium |
Description: Cisco NX-OS 6.0(2)U6(0.46) on N3K devices allows remote authenticated users to cause a denial of service (temporary SNMP outage) via an SNMP request for an OID that does not exist, aka Bug ID CSCuw36684. | ||||
Applies to: |
Created: 2015-10-02 |
Updated: 2024-09-07 |
ID: CVE-2015-6602 |
Title: libutils in Android through 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted metadata in a (1) MP3 or (2) MP4 file, as demonstrated by an attack against use of libutils by libstagefright in Android 5.x. |
Type: Mobile Devices |
Bulletins:
CVE-2015-6602 |
Severity: High |
Description: libutils in Android through 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted metadata in a (1) MP3 or (2) MP4 file, as demonstrated by an attack against use of libutils by libstagefright in Android 5.x. | ||||
Applies to: |
Created: 2015-10-01 |
Updated: 2024-09-07 |
ID: CVE-2015-3876 |
Title: libstagefright in Android through 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted metadata in a (1) MP3 or (2) MP4 file. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3876 |
Severity: High |
Description: libstagefright in Android through 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted metadata in a (1) MP3 or (2) MP4 file. | ||||
Applies to: |
Created: 2015-10-01 |
Updated: 2024-09-07 |
ID: CVE-2015-3843 |
Title: The SIM Toolkit (STK) framework in Android before 5.1.1 LMY48I allows attackers to (1) intercept or (2) emulate unspecified Telephony STK SIM commands via an application that sends a crafted Intent, related to... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3843 |
Severity: High |
Description: The SIM Toolkit (STK) framework in Android before 5.1.1 LMY48I allows attackers to (1) intercept or (2) emulate unspecified Telephony STK SIM commands via an application that sends a crafted Intent, related to com/android/internal/telephony/cat/AppInterface.java, aka internal bug 21697171. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3849 |
Title: The Region_createFromParcel function in core/jni/android/graphics/Region.cpp in Region in Android before 5.1.1 LMY48M does not check the return values of certain read operations, which allows attackers to execute arbitrary code via... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3849 |
Severity: High |
Description: The Region_createFromParcel function in core/jni/android/graphics/Region.cpp in Region in Android before 5.1.1 LMY48M does not check the return values of certain read operations, which allows attackers to execute arbitrary code via an application that sends a crafted message to a service, aka internal bug 21585255. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3836 |
Title: The Parse_wave function in arm-wt-22k/lib_src/eas_mdls.c in the Sonivox DLS-to-EAS converter in Android before 5.1.1 LMY48I does not reject a negative value for a certain size field, which allows remote attackers to execute arbitrary... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3836 |
Severity: High |
Description: The Parse_wave function in arm-wt-22k/lib_src/eas_mdls.c in the Sonivox DLS-to-EAS converter in Android before 5.1.1 LMY48I does not reject a negative value for a certain size field, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted XMF data, aka internal bug 21132860. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3845 |
Title: The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3845 |
Severity: Medium |
Description: The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a different application's privileges via a crafted application, aka internal bug 17312693. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3837 |
Title: The OpenSSLX509Certificate class in org/conscrypt/OpenSSLX509Certificate.java in Android before 5.1.1 LMY48I improperly includes certain context data during serialization and deserialization, which allows attackers to execute... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3837 |
Severity: High |
Description: The OpenSSLX509Certificate class in org/conscrypt/OpenSSLX509Certificate.java in Android before 5.1.1 LMY48I improperly includes certain context data during serialization and deserialization, which allows attackers to execute arbitrary code via an application that sends a crafted Intent, aka internal bug 21437603. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3827 |
Title: The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3827 SFBID76052 |
Severity: High |
Description: The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3824 |
Title: The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not properly restrict size addition, which allows remote attackers to execute arbitrary code or cause a denial of... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3824 SFBID76052 |
Severity: High |
Description: The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not properly restrict size addition, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow and memory corruption) via a crafted MPEG-4 tx3g atom, aka internal bug 20923261. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3826 |
Title: The MPEG4Extractor::parse3GPPMetaData function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not enforce a minimum size for UTF-16 strings containing a Byte Order Mark (BOM), which allows remote... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3826 SFBID76052 |
Severity: Medium |
Description: The MPEG4Extractor::parse3GPPMetaData function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not enforce a minimum size for UTF-16 strings containing a Byte Order Mark (BOM), which allows remote attackers to cause a denial of service (integer underflow, buffer over-read, and mediaserver process crash) via crafted 3GPP metadata, aka internal bug 20923261, a related issue to CVE-2015-3828. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3828 |
Title: The MPEG4Extractor::parse3GPPMetaData function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not enforce a minimum size for UTF-16 strings containing a Byte Order Mark (BOM), which allows remote... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3828 SFBID76052 |
Severity: High |
Description: The MPEG4Extractor::parse3GPPMetaData function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not enforce a minimum size for UTF-16 strings containing a Byte Order Mark (BOM), which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted 3GPP metadata, aka internal bug 20923261, a related issue to CVE-2015-3826. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3833 |
Title: The getRunningAppProcesses function in services/core/java/com/android/server/am/ActivityManagerService.java in Android before 5.1.1 LMY48I allows attackers to bypass intended getRecentTasks restrictions and discover the name of the... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3833 |
Severity: Medium |
Description: The getRunningAppProcesses function in services/core/java/com/android/server/am/ActivityManagerService.java in Android before 5.1.1 LMY48I allows attackers to bypass intended getRecentTasks restrictions and discover the name of the foreground application via a crafted application, aka internal bug 20034603. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3844 |
Title: The getProcessRecordLocked method in services/core/java/com/android/server/am/ActivityManagerService.java in ActivityManager in Android before 5.1.1 LMY48I allows attackers to trigger incorrect process loading via a crafted... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3844 |
Severity: Medium |
Description: The getProcessRecordLocked method in services/core/java/com/android/server/am/ActivityManagerService.java in ActivityManager in Android before 5.1.1 LMY48I allows attackers to trigger incorrect process loading via a crafted application, as demonstrated by interfering with use of the Settings application, aka internal bug 21669445. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3858 |
Title: The checkDestination function in internal/telephony/SMSDispatcher.java in Android before 5.1.1 LMY48M relies on an obsolete permission name for an authorization check, which allows attackers to bypass an intended user-confirmation... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3858 |
Severity: High |
Description: The checkDestination function in internal/telephony/SMSDispatcher.java in Android before 5.1.1 LMY48M relies on an obsolete permission name for an authorization check, which allows attackers to bypass an intended user-confirmation requirement for SMS short-code messaging via a crafted application, aka internal bug 22314646. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-1541 |
Title: The AppWidgetServiceImpl implementation in com/android/server/appwidget/AppWidgetServiceImpl.java in the Settings application in Android before 5.1.1 LMY48I allows attackers to obtain a URI permission via an application that sends an... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1541 |
Severity: Medium |
Description: The AppWidgetServiceImpl implementation in com/android/server/appwidget/AppWidgetServiceImpl.java in the Settings application in Android before 5.1.1 LMY48I allows attackers to obtain a URI permission via an application that sends an Intent with a (1) FLAG_GRANT_READ_URI_PERMISSION or (2) FLAG_GRANT_WRITE_URI_PERMISSION flag, as demonstrated by bypassing intended restrictions on reading contacts, aka internal bug 19618745. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-6575 |
Title: SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I does not properly consider integer promotion, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow and memory... |
Type: Mobile Devices |
Bulletins:
CVE-2015-6575 |
Severity: High |
Description: SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I does not properly consider integer promotion, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow and memory corruption) via crafted atoms in MP4 data, aka internal bug 20139950, a different vulnerability than CVE-2015-1538. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-7915, CVE-2014-7916, and/or CVE-2014-7917. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3860 |
Title: packages/Keyguard/res/layout/keyguard_password_view.xml in Lockscreen in Android 5.x before 5.1.1 LMY48M does not restrict the number of characters in the passwordEntry input field, which allows physically proximate attackers to... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3860 |
Severity: High |
Description: packages/Keyguard/res/layout/keyguard_password_view.xml in Lockscreen in Android 5.x before 5.1.1 LMY48M does not restrict the number of characters in the passwordEntry input field, which allows physically proximate attackers to bypass intended access restrictions via a long password that triggers a SystemUI crash, aka internal bug 22214934. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3829 |
Title: Off-by-one error in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow and... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3829 SFBID76052 |
Severity: High |
Description: Off-by-one error in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow and memory corruption) via crafted MPEG-4 covr atoms with a size equal to SIZE_MAX, aka internal bug 20923261. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-1539 |
Title: Multiple integer underflows in the ESDS::parseESDescriptor function in ESDS.cpp in libstagefright in Android before 5.1.1 LMY48I allow remote attackers to execute arbitrary code via crafted ESDS atoms, aka internal bug 20139950, a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1539 SFBID76052 |
Severity: High |
Description: Multiple integer underflows in the ESDS::parseESDescriptor function in ESDS.cpp in libstagefright in Android before 5.1.1 LMY48I allow remote attackers to execute arbitrary code via crafted ESDS atoms, aka internal bug 20139950, a related issue to CVE-2015-4493. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3834 |
Title: Multiple integer overflows in the BnHDCP::onTransact function in media/libmedia/IHDCP.cpp in libstagefright in Android before 5.1.1 LMY48I allow attackers to execute arbitrary code via a crafted application that uses HDCP encryption,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3834 |
Severity: High |
Description: Multiple integer overflows in the BnHDCP::onTransact function in media/libmedia/IHDCP.cpp in libstagefright in Android before 5.1.1 LMY48I allow attackers to execute arbitrary code via a crafted application that uses HDCP encryption, leading to a heap-based buffer overflow, aka internal bug 20222489. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3863 |
Title: Multiple integer overflows in the Blob class in keystore/keystore.cpp in Keystore in Android before 5.1.1 LMY48M allow attackers to execute arbitrary code and read arbitrary Keystore keys via an application that uses a crafted blob... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3863 |
Severity: High |
Description: Multiple integer overflows in the Blob class in keystore/keystore.cpp in Keystore in Android before 5.1.1 LMY48M allow attackers to execute arbitrary code and read arbitrary Keystore keys via an application that uses a crafted blob in an insert operation, aka internal bug 22802399. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3861 |
Title: Multiple integer overflows in the addVorbisCodecInfo function in matroska/MatroskaExtractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allow remote attackers to cause a denial of service (device... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3861 |
Severity: Medium |
Description: Multiple integer overflows in the addVorbisCodecInfo function in matroska/MatroskaExtractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allow remote attackers to cause a denial of service (device inoperability) via crafted Matroska data, aka internal bug 21296336. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3842 |
Title: Multiple heap-based buffer overflows in libeffects in the Audio Policy Service in mediaserver in Android before 5.1.1 LMY48I allow attackers to execute arbitrary code via a crafted application, aka internal bug 21953516. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3842 |
Severity: High |
Description: Multiple heap-based buffer overflows in libeffects in the Audio Policy Service in mediaserver in Android before 5.1.1 LMY48I allow attackers to execute arbitrary code via a crafted application, aka internal bug 21953516. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3832 |
Title: Multiple buffer overflows in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I allow remote attackers to execute arbitrary code via invalid size values of NAL units in MP4 data, aka internal bug 19641538. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3832 |
Severity: High |
Description: Multiple buffer overflows in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I allow remote attackers to execute arbitrary code via invalid size values of NAL units in MP4 data, aka internal bug 19641538. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3864 |
Title: Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3864 SFBID76682 |
Severity: High |
Description: Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-1538 |
Title: Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1538 SFBID76052 |
Severity: High |
Description: Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-1528 |
Title: Integer overflow in the native_handle_create function in libcutils/native_handle.c in Android before 5.1.1 LMY48M allows attackers to obtain a different application's privileges or cause a denial of service (Binder heap memory... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1528 |
Severity: High |
Description: Integer overflow in the native_handle_create function in libcutils/native_handle.c in Android before 5.1.1 LMY48M allows attackers to obtain a different application's privileges or cause a denial of service (Binder heap memory corruption) via a crafted application, aka internal bug 19334482. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-1536 |
Title: Integer overflow in the Bitmap_createFromParcel function in core/jni/android/graphics/Bitmap.cpp in Android before 5.1.1 LMY48I allows attackers to cause a denial of service (system_server crash) or obtain sensitive system_server... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1536 |
Severity: High |
Description: Integer overflow in the Bitmap_createFromParcel function in core/jni/android/graphics/Bitmap.cpp in Android before 5.1.1 LMY48I allows attackers to cause a denial of service (system_server crash) or obtain sensitive system_server memory-content information via a crafted application that leverages improper unmarshalling of bitmaps, aka internal bug 19666945. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2014-7916 |
Title: Integer overflow in SampleTable.cpp in libstagefright in Android before 5.0.0 has unspecified impact and attack vectors, aka internal bug 15342751. |
Type: Mobile Devices |
Bulletins:
CVE-2014-7916 |
Severity: High |
Description: Integer overflow in SampleTable.cpp in libstagefright in Android before 5.0.0 has unspecified impact and attack vectors, aka internal bug 15342751. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2014-7917 |
Title: Integer overflow in SampleTable.cpp in libstagefright in Android before 5.0.0 has unspecified impact and attack vectors, aka internal bug 15342615. |
Type: Mobile Devices |
Bulletins:
CVE-2014-7917 |
Severity: High |
Description: Integer overflow in SampleTable.cpp in libstagefright in Android before 5.0.0 has unspecified impact and attack vectors, aka internal bug 15342615. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2014-7915 |
Title: Integer overflow in SampleTable.cpp in libstagefright in Android before 5.0.0 has unspecified impact and attack vectors, aka internal bug 15328708. |
Type: Mobile Devices |
Bulletins:
CVE-2014-7915 |
Severity: High |
Description: Integer overflow in SampleTable.cpp in libstagefright in Android before 5.0.0 has unspecified impact and attack vectors, aka internal bug 15328708. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3831 |
Title: Buffer overflow in the readAt function in BpMediaHTTPConnection in media/libmedia/IMediaHTTPConnection.cpp in the mediaserver service in Android before 5.1.1 LMY48I allows attackers to execute arbitrary code via a crafted... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3831 |
Severity: High |
Description: Buffer overflow in the readAt function in BpMediaHTTPConnection in media/libmedia/IMediaHTTPConnection.cpp in the mediaserver service in Android before 5.1.1 LMY48I allows attackers to execute arbitrary code via a crafted application, aka internal bug 19400722. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-3835 |
Title: Buffer overflow in the OMXNodeInstance::emptyBuffer function in omx/OMXNodeInstance.cpp in libstagefright in Android before 5.1.1 LMY48I allows attackers to execute arbitrary code via a crafted application, aka internal bug 20634516. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3835 |
Severity: High |
Description: Buffer overflow in the OMXNodeInstance::emptyBuffer function in omx/OMXNodeInstance.cpp in libstagefright in Android before 5.1.1 LMY48I allows attackers to execute arbitrary code via a crafted application, aka internal bug 20634516. | ||||
Applies to: |
Created: 2015-09-30 |
Updated: 2024-09-07 |
ID: CVE-2015-6280 |
Title: The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E before 3.6.3E, 3.7E before 3.7.1E, 3.10S before 3.10.6S, 3.11S before 3.11.4S, 3.12S before 3.12.3S, 3.13S before 3.13.3S, and 3.14S before 3.14.1S does not properly... |
Type: Hardware |
Bulletins:
CVE-2015-6280 |
Severity: High |
Description: The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E before 3.6.3E, 3.7E before 3.7.1E, 3.10S before 3.10.6S, 3.11S before 3.11.4S, 3.12S before 3.12.3S, 3.13S before 3.13.3S, and 3.14S before 3.14.1S does not properly implement RSA authentication, which allows remote attackers to obtain login access by leveraging knowledge of a username and the associated public key, aka Bug ID CSCus73013. | ||||
Applies to: |
Created: 2015-09-27 |
Updated: 2024-09-07 |
ID: CVE-2015-6278 |
Title: The IPv6 snooping functionality in the first-hop security subsystem in Cisco IOS 12.2, 15.0, 15.1, 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.2SE, 3.3SE, 3.3XO, 3.4SG, 3.5E, and 3.6E before 3.6.3E; 3.7E before 3.7.2E; 3.9S and 3.10S before 3.10.6S;... |
Type: Hardware |
Bulletins:
CVE-2015-6278 |
Severity: High |
Description: The IPv6 snooping functionality in the first-hop security subsystem in Cisco IOS 12.2, 15.0, 15.1, 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.2SE, 3.3SE, 3.3XO, 3.4SG, 3.5E, and 3.6E before 3.6.3E; 3.7E before 3.7.2E; 3.9S and 3.10S before 3.10.6S; 3.11S before 3.11.4S; 3.12S and 3.13S before 3.13.3S; and 3.14S before 3.14.2S does not properly implement the Control Plane Protection (aka CPPr) feature, which allows remote attackers to cause a denial of service (device reload) via a flood of ND packets, aka Bug ID CSCus19794. | ||||
Applies to: |
Created: 2015-09-27 |
Updated: 2024-09-07 |
ID: CVE-2015-6279 |
Title: The IPv6 snooping functionality in the first-hop security subsystem in Cisco IOS 12.2, 15.0, 15.1, 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.2SE, 3.3SE, 3.3XO, 3.4SG, 3.5E, and 3.6E before 3.6.3E; 3.7E before 3.7.2E; 3.9S and 3.10S before 3.10.6S;... |
Type: Hardware |
Bulletins:
CVE-2015-6279 |
Severity: High |
Description: The IPv6 snooping functionality in the first-hop security subsystem in Cisco IOS 12.2, 15.0, 15.1, 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.2SE, 3.3SE, 3.3XO, 3.4SG, 3.5E, and 3.6E before 3.6.3E; 3.7E before 3.7.2E; 3.9S and 3.10S before 3.10.6S; 3.11S before 3.11.4S; 3.12S and 3.13S before 3.13.3S; and 3.14S before 3.14.2S allows remote attackers to cause a denial of service (device reload) via a malformed ND packet with the Cryptographically Generated Address (CGA) option, aka Bug ID CSCuo04400. | ||||
Applies to: |
Created: 2015-09-27 |
Updated: 2024-09-07 |
ID: CVE-2015-6302 |
Title: The RADIUS functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.0(250.0) and 7.0(252.0) allows remote attackers to disconnect arbitrary sessions via crafted Disconnect-Request UDP packets, aka Bug ID CSCuw29419. |
Type: Hardware |
Bulletins:
CVE-2015-6302 |
Severity: Medium |
Description: The RADIUS functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.0(250.0) and 7.0(252.0) allows remote attackers to disconnect arbitrary sessions via crafted Disconnect-Request UDP packets, aka Bug ID CSCuw29419. | ||||
Applies to: |
Created: 2015-09-25 |
Updated: 2024-09-07 |
ID: CVE-2015-6282 |
Title: Cisco IOS XE 2.x and 3.x before 3.10.6S, 3.11.xS through 3.13.xS before 3.13.3S, and 3.14.xS through 3.15.xS before 3.15.1S allows remote attackers to cause a denial of service (device reload) via IPv4 packets that require NAT and MPLS actions, aka... |
Type: Hardware |
Bulletins:
CVE-2015-6282 |
Severity: High |
Description: Cisco IOS XE 2.x and 3.x before 3.10.6S, 3.11.xS through 3.13.xS before 3.13.3S, and 3.14.xS through 3.15.xS before 3.15.1S allows remote attackers to cause a denial of service (device reload) via IPv4 packets that require NAT and MPLS actions, aka Bug ID CSCut96933. | ||||
Applies to: |
Created: 2015-09-25 |
Updated: 2024-09-07 |
ID: CVE-2015-6295 |
Title: Cisco NX-OS 6.1(2)I3(4) and 7.0(3)I1(1) on Nexus 9000 (N9K) devices allows remote attackers to cause a denial of service (CPU consumption or control-plane instability) or trigger unintended traffic forwarding via a Layer 2 packet with a reserved... |
Type: Hardware |
Bulletins:
CVE-2015-6295 |
Severity: Medium |
Description: Cisco NX-OS 6.1(2)I3(4) and 7.0(3)I1(1) on Nexus 9000 (N9K) devices allows remote attackers to cause a denial of service (CPU consumption or control-plane instability) or trigger unintended traffic forwarding via a Layer 2 packet with a reserved VLAN number, aka Bug ID CSCuw13560. | ||||
Applies to: |
Created: 2015-09-20 |
Updated: 2024-09-07 |
ID: CVE-2015-5879 |
Title: XNU in the kernel in Apple iOS before 9 does not properly validate the headers of TCP packets, which allows remote attackers to bypass the sequence-number protection mechanism and cause a denial of service (TCP connection disruption)... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5879 SFBID76764 |
Severity: Medium |
Description: XNU in the kernel in Apple iOS before 9 does not properly validate the headers of TCP packets, which allows remote attackers to bypass the sequence-number protection mechanism and cause a denial of service (TCP connection disruption) via a crafted header. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5793 |
Title: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5793 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5791 |
Title: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5791 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5814 |
Title: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5814 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5816 |
Title: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5816 SFBID76764 |
Severity: Medium |
Description: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5822 |
Title: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5822 SFBID76764 |
Severity: Medium |
Description: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5823 |
Title: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5823 SFBID76764 |
Severity: Medium |
Description: WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5792 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5792 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5794 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5794 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5795 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5795 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5796 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5796 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5797 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5797 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5799 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5799 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5800 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5800 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5801 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5801 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5789 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5789 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5790 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5790 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5802 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5802 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5803 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5803 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5804 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5804 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5805 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5805 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5806 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5806 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5807 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5807 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5809 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5809 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5810 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5810 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5811 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5811 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5812 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5812 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5813 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5813 SFBID76763 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5817 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5817 SFBID76766 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5818 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5818 SFBID76766 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5819 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5819 SFBID76766 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5821 |
Title: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5821 SFBID76766 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5921 |
Title: WebKit in Apple iOS before 9 mishandles "Content-Disposition: attachment" HTTP headers, which might allow man-in-the-middle attackers to obtain sensitive information via unspecified vectors. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5921 SFBID76766 |
Severity: Medium |
Description: WebKit in Apple iOS before 9 mishandles "Content-Disposition: attachment" HTTP headers, which might allow man-in-the-middle attackers to obtain sensitive information via unspecified vectors. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5826 |
Title: WebKit in Apple iOS before 9 does not properly select the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5826 SFBID76766 |
Severity: Medium |
Description: WebKit in Apple iOS before 9 does not properly select the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5825 |
Title: WebKit in Apple iOS before 9 does not properly restrict the availability of Performance API times, which allows remote attackers to obtain sensitive information about the browser history, mouse movement, or network traffic via... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5825 SFBID76766 |
Severity: Medium |
Description: WebKit in Apple iOS before 9 does not properly restrict the availability of Performance API times, which allows remote attackers to obtain sensitive information about the browser history, mouse movement, or network traffic via crafted JavaScript code. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5820 |
Title: WebKit in Apple iOS before 9 allows remote attackers to trigger a dialing action via a crafted (1) tel://, (2) facetime://, or (3) facetime-audio:// URL. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5820 SFBID76766 |
Severity: Medium |
Description: WebKit in Apple iOS before 9 allows remote attackers to trigger a dialing action via a crafted (1) tel://, (2) facetime://, or (3) facetime-audio:// URL. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5827 |
Title: WebKit in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain an object reference via vectors involving a (1) custom event, (2) message event, or (3) pop state event. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5827 SFBID76766 |
Severity: Medium |
Description: WebKit in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain an object reference via vectors involving a (1) custom event, (2) message event, or (3) pop state event. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5907 |
Title: WebKit in Apple iOS before 9 allows man-in-the-middle attackers to conduct redirection attacks by leveraging the mishandling of the resource cache of an SSL web site with an invalid X.509 certificate. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5907 SFBID76766 |
Severity: Low |
Description: WebKit in Apple iOS before 9 allows man-in-the-middle attackers to conduct redirection attacks by leveraging the mishandling of the resource cache of an SSL web site with an invalid X.509 certificate. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5788 |
Title: The WebKit Canvas implementation in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain sensitive image information via vectors involving a CANVAS element. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5788 SFBID76766 |
Severity: Medium |
Description: The WebKit Canvas implementation in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain sensitive image information via vectors involving a CANVAS element. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5764 |
Title: The user interface in Safari in Apple iOS before 9 allows remote attackers to spoof URLs via unspecified vectors, a different vulnerability than CVE-2015-5765 and CVE-2015-5767. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5764 SFBID76764 |
Severity: Medium |
Description: The user interface in Safari in Apple iOS before 9 allows remote attackers to spoof URLs via unspecified vectors, a different vulnerability than CVE-2015-5765 and CVE-2015-5767. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5765 |
Title: The user interface in Safari in Apple iOS before 9 allows remote attackers to spoof URLs via unspecified vectors, a different vulnerability than CVE-2015-5764 and CVE-2015-5767. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5765 SFBID76764 |
Severity: Medium |
Description: The user interface in Safari in Apple iOS before 9 allows remote attackers to spoof URLs via unspecified vectors, a different vulnerability than CVE-2015-5764 and CVE-2015-5767. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5767 |
Title: The user interface in Safari in Apple iOS before 9 allows remote attackers to spoof URLs via unspecified vectors, a different vulnerability than CVE-2015-5764 and CVE-2015-5765. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5767 SFBID76764 |
Severity: Medium |
Description: The user interface in Safari in Apple iOS before 9 allows remote attackers to spoof URLs via unspecified vectors, a different vulnerability than CVE-2015-5764 and CVE-2015-5765. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5832 |
Title: The iTunes Store component in Apple iOS before 9 does not properly delete AppleID credentials from the keychain upon a signout action, which might allow physically proximate attackers to obtain sensitive information via unspecified... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5832 SFBID76764 |
Severity: Low |
Description: The iTunes Store component in Apple iOS before 9 does not properly delete AppleID credentials from the keychain upon a signout action, which might allow physically proximate attackers to obtain sensitive information via unspecified vectors. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5906 |
Title: The HTML form implementation in WebKit in Apple iOS before 9 does not prevent QuickType access to the final character of a password, which might make it easier for remote attackers to discover a password by leveraging a later... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5906 SFBID76766 |
Severity: Medium |
Description: The HTML form implementation in WebKit in Apple iOS before 9 does not prevent QuickType access to the final character of a password, which might make it easier for remote attackers to discover a password by leveraging a later prediction containing that character. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-3801 |
Title: The document.cookie API implementation in the CFNetwork Cookies subsystem in WebKit in Apple iOS before 9 allows remote attackers to bypass an intended single-cookie restriction via unspecified vectors. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3801 SFBID76764 |
Severity: Medium |
Description: The document.cookie API implementation in the CFNetwork Cookies subsystem in WebKit in Apple iOS before 9 allows remote attackers to bypass an intended single-cookie restriction via unspecified vectors. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-6297 |
Title: The DHCPv6 server in Cisco IOS on ASR 9000 devices with software 5.2.0 Base allows remote attackers to cause a denial of service (process reset) via crafted packets, aka Bug ID CSCun36525. |
Type: Hardware |
Bulletins:
CVE-2015-6297 |
Severity: Medium |
Description: The DHCPv6 server in Cisco IOS on ASR 9000 devices with software 5.2.0 Base allows remote attackers to cause a denial of service (process reset) via crafted packets, aka Bug ID CSCun36525. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5851 |
Title: The convenience initializer in the Multipeer Connectivity component in Apple iOS before 9 does not require an encrypted session, which allows local users to obtain cleartext multipeer data via an encrypted-to-unencrypted downgrade attack. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5851 SFBID76764 |
Severity: Low |
Description: The convenience initializer in the Multipeer Connectivity component in Apple iOS before 9 does not require an encrypted session, which allows local users to obtain cleartext multipeer data via an encrypted-to-unencrypted downgrade attack. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5912 |
Title: The CFNetwork FTPProtocol component in Apple iOS before 9 allows remote FTP proxy servers to trigger TCP connection attempts to intranet hosts via crafted responses. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5912 SFBID76764 |
Severity: Medium |
Description: The CFNetwork FTPProtocol component in Apple iOS before 9 allows remote FTP proxy servers to trigger TCP connection attempts to intranet hosts via crafted responses. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5856 |
Title: The Application Store component in Apple iOS before 9 allows remote attackers to cause a denial of service to an enterprise-signed app via a crafted ITMS URL. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5856 SFBID76764 |
Severity: Medium |
Description: The Application Store component in Apple iOS before 9 allows remote attackers to cause a denial of service to an enterprise-signed app via a crafted ITMS URL. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2014-8611 |
Title: The __sflush function in fflush.c in stdio in libc in FreeBSD 10.1 and the kernel in Apple iOS before 9 mishandles failures of the write system call, which allows context-dependent attackers to execute arbitrary code or cause a... |
Type: Mobile Devices |
Bulletins:
CVE-2014-8611 |
Severity: Medium |
Description: The __sflush function in fflush.c in stdio in libc in FreeBSD 10.1 and the kernel in Apple iOS before 9 mishandles failures of the write system call, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted application. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5838 |
Title: SpringBoard in Apple iOS before 9 does not properly restrict access to privileged API calls, which allows attackers to spoof the dialog windows of an arbitrary app via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5838 SFBID76764 |
Severity: Medium |
Description: SpringBoard in Apple iOS before 9 does not properly restrict access to privileged API calls, which allows attackers to spoof the dialog windows of an arbitrary app via a crafted app. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5861 |
Title: SpringBoard in Apple iOS before 9 allows physically proximate attackers to bypass a lock-screen preview-disabled setting, and reply to an audio message, via unspecified vectors. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5861 SFBID76764 |
Severity: Low |
Description: SpringBoard in Apple iOS before 9 allows physically proximate attackers to bypass a lock-screen preview-disabled setting, and reply to an audio message, via unspecified vectors. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5892 |
Title: Siri in Apple iOS before 9 allows physically proximate attackers to bypass an intended client-side protection mechanism and obtain sensitive content-notification information by listening to a device in the lock-screen state. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5892 SFBID76764 |
Severity: Low |
Description: Siri in Apple iOS before 9 allows physically proximate attackers to bypass an intended client-side protection mechanism and obtain sensitive content-notification information by listening to a device in the lock-screen state. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5905 |
Title: Safari in Apple iOS before 9 allows remote attackers to spoof the relationship between URLs and web content via a crafted window opener on a web site. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5905 SFBID76764 |
Severity: Medium |
Description: Safari in Apple iOS before 9 allows remote attackers to spoof the relationship between URLs and web content via a crafted window opener on a web site. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5904 |
Title: Safari in Apple iOS before 9 allows remote attackers to spoof the relationship between URLs and web content via a crafted web site. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5904 SFBID76764 |
Severity: Medium |
Description: Safari in Apple iOS before 9 allows remote attackers to spoof the relationship between URLs and web content via a crafted web site. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5831 |
Title: NetworkExtension in the kernel in Apple iOS before 9 does not properly initialize an unspecified data structure, which allows attackers to obtain sensitive memory-layout information via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5831 SFBID76764 |
Severity: Medium |
Description: NetworkExtension in the kernel in Apple iOS before 9 does not properly initialize an unspecified data structure, which allows attackers to obtain sensitive memory-layout information via a crafted app. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5857 |
Title: Mail in Apple iOS before 9 allows remote attackers to use an address-book contact as a spoofed e-mail sender address via unspecified vectors. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5857 SFBID76764 |
Severity: Medium |
Description: Mail in Apple iOS before 9 allows remote attackers to use an address-book contact as a spoofed e-mail sender address via unspecified vectors. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5880 |
Title: CoreAnimation in Apple iOS before 9 allows attackers to bypass intended IOSurface restrictions and obtain screen-framebuffer access via a crafted background app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5880 SFBID76764 |
Severity: Medium |
Description: CoreAnimation in Apple iOS before 9 allows attackers to bypass intended IOSurface restrictions and obtain screen-framebuffer access via a crafted background app. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-6294 |
Title: Cisco IOS 15.2(3)E and earlier and IOS XE 3.6(2)E and earlier allow remote attackers to cause a denial of service (functionality loss) via crafted Cisco Discovery Protocol (CDP) packets, aka Bug ID CSCuu25770. |
Type: Hardware |
Bulletins:
CVE-2015-6294 |
Severity: Medium |
Description: Cisco IOS 15.2(3)E and earlier and IOS XE 3.6(2)E and earlier allow remote attackers to cause a denial of service (functionality loss) via crafted Cisco Discovery Protocol (CDP) packets, aka Bug ID CSCuu25770. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5850 |
Title: AppleKeyStore in Apple iOS before 9 allows physically proximate attackers to reset the count of incorrect passcode attempts via a device backup. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5850 SFBID76764 |
Severity: Low |
Description: AppleKeyStore in Apple iOS before 9 allows physically proximate attackers to reset the count of incorrect passcode attempts via a device backup. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-5835 |
Title: Apple iOS before 9 allows attackers to obtain sensitive information about inter-app communication via a crafted app that conducts an interception attack involving an unspecified URL scheme. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5835 SFBID76764 |
Severity: Medium |
Description: Apple iOS before 9 allows attackers to obtain sensitive information about inter-app communication via a crafted app that conducts an interception attack involving an unspecified URL scheme. | ||||
Applies to: |
Created: 2015-09-18 |
Updated: 2024-09-07 |
ID: CVE-2015-6270 |
Title: Cisco IOS XE before 2.2.3 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted IPv6 packet, aka Bug ID CSCsv98555. |
Type: Hardware |
Bulletins:
CVE-2015-6270 |
Severity: High |
Description: Cisco IOS XE before 2.2.3 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted IPv6 packet, aka Bug ID CSCsv98555. | ||||
Applies to: |
Created: 2015-08-31 |
Updated: 2024-09-07 |
ID: CVE-2015-6269 |
Title: Cisco IOS XE before 2.2.3 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted (1) IPv4 or (2) IPv6 packet, aka Bug ID CSCsw69990. |
Type: Hardware |
Bulletins:
CVE-2015-6269 |
Severity: High |
Description: Cisco IOS XE before 2.2.3 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted (1) IPv4 or (2) IPv6 packet, aka Bug ID CSCsw69990. | ||||
Applies to: |
Created: 2015-08-31 |
Updated: 2024-09-07 |
ID: CVE-2015-6271 |
Title: Cisco IOS XE 2.1.0 through 2.4.3 and 2.5.0 on ASR 1000 devices, when NAT Application Layer Gateway is used, allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted SIP packet, aka Bug IDs CSCta74749 and... |
Type: Hardware |
Bulletins:
CVE-2015-6271 |
Severity: High |
Description: Cisco IOS XE 2.1.0 through 2.4.3 and 2.5.0 on ASR 1000 devices, when NAT Application Layer Gateway is used, allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted SIP packet, aka Bug IDs CSCta74749 and CSCta77008. | ||||
Applies to: |
Created: 2015-08-31 |
Updated: 2024-09-07 |
ID: CVE-2015-6272 |
Title: Cisco IOS XE 2.1.0 through 2.2.3 and 2.3.0 on ASR 1000 devices, when NAT Application Layer Gateway is used, allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted H.323 packet, aka Bug ID CSCsx35393,... |
Type: Hardware |
Bulletins:
CVE-2015-6272 |
Severity: High |
Description: Cisco IOS XE 2.1.0 through 2.2.3 and 2.3.0 on ASR 1000 devices, when NAT Application Layer Gateway is used, allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted H.323 packet, aka Bug ID CSCsx35393, CSCsx07094, and CSCsw93064. | ||||
Applies to: |
Created: 2015-08-31 |
Updated: 2024-09-07 |
ID: CVE-2015-6273 |
Title: Cisco IOS XE before 3.1.2S on ASR 1000 devices mishandles the automatic setup of Virtual Fragment Reassembly (VFR) by certain firewall and NAT components, which allows remote attackers to cause a denial of service (Embedded Services Processor crash)... |
Type: Hardware |
Bulletins:
CVE-2015-6273 |
Severity: High |
Description: Cisco IOS XE before 3.1.2S on ASR 1000 devices mishandles the automatic setup of Virtual Fragment Reassembly (VFR) by certain firewall and NAT components, which allows remote attackers to cause a denial of service (Embedded Services Processor crash) via crafted IP packets, aka Bug IDs CSCtf87624, CSCte93229, CSCtd19103, and CSCti63623. | ||||
Applies to: |
Created: 2015-08-28 |
Updated: 2024-09-07 |
ID: CVE-2015-6267 |
Title: Cisco IOS XE before 2.2.3 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted L2TP packet, aka Bug IDs CSCsw95722 and CSCsw95496. |
Type: Hardware |
Bulletins:
CVE-2015-6267 |
Severity: High |
Description: Cisco IOS XE before 2.2.3 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted L2TP packet, aka Bug IDs CSCsw95722 and CSCsw95496. | ||||
Applies to: |
Created: 2015-08-28 |
Updated: 2024-09-07 |
ID: CVE-2015-6268 |
Title: Cisco IOS XE before 2.2.3 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted IPv4 UDP packet, aka Bug ID CSCsw95482. |
Type: Hardware |
Bulletins:
CVE-2015-6268 |
Severity: High |
Description: Cisco IOS XE before 2.2.3 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted IPv4 UDP packet, aka Bug ID CSCsw95482. | ||||
Applies to: |
Created: 2015-08-28 |
Updated: 2024-09-07 |
ID: CVE-2015-6258 |
Title: The Internet Access Point Protocol (IAPP) module on Cisco Wireless LAN Controller (WLC) devices with software 8.1(104.37) allows remote attackers to trigger incorrect traffic forwarding via crafted IPv6 packets, aka Bug ID CSCuv40033. |
Type: Hardware |
Bulletins:
CVE-2015-6258 |
Severity: Medium |
Description: The Internet Access Point Protocol (IAPP) module on Cisco Wireless LAN Controller (WLC) devices with software 8.1(104.37) allows remote attackers to trigger incorrect traffic forwarding via crafted IPv6 packets, aka Bug ID CSCuv40033. | ||||
Applies to: |
Created: 2015-08-22 |
Updated: 2024-09-07 |
ID: CVE-2015-4277 |
Title: The global-configuration implementation on Cisco ASR 9000 devices with software 5.1.3 and 5.3.0 improperly closes vty sessions after a commit/end operation, which allows local users to cause a denial of service (tmp/*config file creation, memory... |
Type: Hardware |
Bulletins:
CVE-2015-4277 |
Severity: Medium |
Description: The global-configuration implementation on Cisco ASR 9000 devices with software 5.1.3 and 5.3.0 improperly closes vty sessions after a commit/end operation, which allows local users to cause a denial of service (tmp/*config file creation, memory consumption, and device hang) via unspecified vectors, aka Bug ID CSCut93842. | ||||
Applies to: |
Created: 2015-08-19 |
Updated: 2024-09-07 |
ID: CVE-2015-4296 |
Title: Nexus Data Broker (NDB) on Cisco Nexus 3000 devices with software 6.0(2)A6(1) allows remote attackers to cause a denial of service (Java process restart) via crafted connections to the Java application, aka Bug ID CSCut87006. |
Type: Hardware |
Bulletins:
CVE-2015-4296 |
Severity: Medium |
Description: Nexus Data Broker (NDB) on Cisco Nexus 3000 devices with software 6.0(2)A6(1) allows remote attackers to cause a denial of service (Java process restart) via crafted connections to the Java application, aka Bug ID CSCut87006. | ||||
Applies to: |
Created: 2015-08-19 |
Updated: 2024-09-07 |
ID: CVE-2015-4301 |
Title: Cisco NX-OS on Nexus 9000 devices 11.1(1c) allows remote authenticated users to cause a denial of service (device hang) via large files that are copied to a device's filesystem, aka Bug ID CSCuu77225. |
Type: Hardware |
Bulletins:
CVE-2015-4301 |
Severity: Medium |
Description: Cisco NX-OS on Nexus 9000 devices 11.1(1c) allows remote authenticated users to cause a denial of service (device hang) via large files that are copied to a device's filesystem, aka Bug ID CSCuu77225. | ||||
Applies to: |
Created: 2015-08-19 |
Updated: 2024-09-07 |
ID: CVE-2015-4323 |
Title: Buffer overflow in Cisco NX-OS on Nexus 1000V devices for VMware vSphere 7.3(0)ZN(0.9); Nexus 3000 devices 6.0(2)U5(1.41), 7.0(3)I2(0.373), and 7.3(0)ZN(0.83); Nexus 4000 devices 4.1(2)E1(1b); Nexus 7000 devices 6.2(14)S1; Nexus 9000 devices... |
Type: Hardware |
Bulletins:
CVE-2015-4323 SFBID76367 |
Severity: Medium |
Description: Buffer overflow in Cisco NX-OS on Nexus 1000V devices for VMware vSphere 7.3(0)ZN(0.9); Nexus 3000 devices 6.0(2)U5(1.41), 7.0(3)I2(0.373), and 7.3(0)ZN(0.83); Nexus 4000 devices 4.1(2)E1(1b); Nexus 7000 devices 6.2(14)S1; Nexus 9000 devices 7.3(0)ZN(0.9); and MDS 9000 devices 6.2 (13) and 7.1(0)ZN(91.99) and MDS SAN-OS 7.1(0)ZN(91.99) allows remote attackers to cause a denial of service (device outage) via a crafted ARP packet, related to incorrect MTU validation, aka Bug IDs CSCuv71933, CSCuv61341, CSCuv61321, CSCuu78074, CSCut37060, CSCuv61266, CSCuv61351, CSCuv61358, and CSCuv61366. | ||||
Applies to: |
Created: 2015-08-19 |
Updated: 2024-09-07 |
ID: CVE-2015-4324 |
Title: Buffer overflow in Cisco NX-OS on Nexus 1000V devices for VMware vSphere 7.3(0)ZN(0.81), Nexus 3000 devices 7.3(0)ZN(0.81), Nexus 4000 devices 4.1(2)E1(1c), Nexus 7000 devices 7.2(0)N1(0.1), and Nexus 9000 devices 7.3(0)ZN(0.81) allows remote... |
Type: Hardware |
Bulletins:
CVE-2015-4324 SFBID76372 |
Severity: Medium |
Description: Buffer overflow in Cisco NX-OS on Nexus 1000V devices for VMware vSphere 7.3(0)ZN(0.81), Nexus 3000 devices 7.3(0)ZN(0.81), Nexus 4000 devices 4.1(2)E1(1c), Nexus 7000 devices 7.2(0)N1(0.1), and Nexus 9000 devices 7.3(0)ZN(0.81) allows remote attackers to cause a denial of service (IGMP process restart) via a malformed IGMPv3 packet that is mishandled during memory allocation, aka Bug IDs CSCuv69713, CSCuv69717, CSCuv69723, CSCuv69732, and CSCuv48908. | ||||
Applies to: |
Created: 2015-08-19 |
Updated: 2024-09-07 |
ID: CVE-2015-3732 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3732 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3733 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3733 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3735 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3735 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3736 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3736 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3737 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3737 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3738 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3738 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3739 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3739 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3740 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3740 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3730 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3730 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3731 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3731 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3734 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3734 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3741 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3741 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3742 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3742 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3743 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3743 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3744 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3744 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3745 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3745 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3746 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3746 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3747 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3747 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3748 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3748 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3749 |
Title: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3749 SFBID76338 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3753 |
Title: WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly perform taint checking for CANVAS elements, which allows remote attackers to bypass the... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3753 SFBID76341 |
Severity: Medium |
Description: WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly perform taint checking for CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive image data by leveraging a redirect to a data:image resource. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3750 |
Title: WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not enforce the HTTP Strict Transport Security (HSTS) protection mechanism for Content Security Policy... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3750 SFBID76341 |
Severity: Medium |
Description: WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not enforce the HTTP Strict Transport Security (HSTS) protection mechanism for Content Security Policy (CSP) report requests, which allows man-in-the-middle attackers to obtain sensitive information by sniffing the network or spoof a report by modifying the client-server data stream. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3755 |
Title: WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to spoof the user interface via a malformed URL. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3755 SFBID76344 |
Severity: Medium |
Description: WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to spoof the user interface via a malformed URL. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3751 |
Title: WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to bypass a Content Security Policy protection mechanism by using a video control in... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3751 SFBID76341 |
Severity: Medium |
Description: WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to bypass a Content Security Policy protection mechanism by using a video control in conjunction with an IMG element within an OBJECT element. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5759 |
Title: WebKit in Apple iOS before 8.4.1 allows remote attackers to spoof clicks via a crafted web site that leverages tap events. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5759 SFBID76337 |
Severity: Medium |
Description: WebKit in Apple iOS before 8.4.1 allows remote attackers to spoof clicks via a crafted web site that leverages tap events. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3758 |
Title: UIKit WebView in Apple iOS before 8.4.1 allows attackers to bypass an intended user-confirmation requirement and initiate arbitrary FaceTime calls via an app that provides a crafted URL. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3758 SFBID76337 |
Severity: Medium |
Description: UIKit WebView in Apple iOS before 8.4.1 allows attackers to bypass an intended user-confirmation requirement and initiate arbitrary FaceTime calls via an app that provides a crafted URL. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3796 |
Title: The TRE library in Libc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows context-dependent attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted regular... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3796 SFBID76343 |
Severity: High |
Description: The TRE library in Libc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows context-dependent attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted regular expression, a different vulnerability than CVE-2015-3797 and CVE-2015-3798. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3797 |
Title: The TRE library in Libc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows context-dependent attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted regular... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3797 SFBID76343 |
Severity: High |
Description: The TRE library in Libc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows context-dependent attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted regular expression, a different vulnerability than CVE-2015-3796 and CVE-2015-3798. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3798 |
Title: The TRE library in Libc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows context-dependent attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted regular... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3798 SFBID76343 |
Severity: High |
Description: The TRE library in Libc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows context-dependent attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted regular expression, a different vulnerability than CVE-2015-3796 and CVE-2015-3797. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5749 |
Title: The Sandbox_profiles component in Apple iOS before 8.4.1 allows attackers to bypass the third-party app-sandbox protection mechanism and read arbitrary managed preferences via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5749 SFBID76337 |
Severity: Medium |
Description: The Sandbox_profiles component in Apple iOS before 8.4.1 allows attackers to bypass the third-party app-sandbox protection mechanism and read arbitrary managed preferences via a crafted app. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5769 |
Title: The MSVDX driver in Apple iOS before 8.4.1 allows remote attackers to cause a denial of service (device crash) via a crafted video. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5769 SFBID76337 |
Severity: High |
Description: The MSVDX driver in Apple iOS before 8.4.1 allows remote attackers to cause a denial of service (device crash) via a crafted video. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5748 |
Title: The kernel in Apple OS X before 10.10.5 does not properly mount HFS volumes, which allows local users to cause a denial of service via a crafted volume. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5748 SFBID76340 |
Severity: Low |
Description: The kernel in Apple OS X before 10.10.5 does not properly mount HFS volumes, which allows local users to cause a denial of service via a crafted volume. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3766 |
Title: The kernel in Apple iOS before 8.4.1 and OS X before 10.10.5 does not properly restrict the mach_port_space_info interface, which allows attackers to obtain sensitive memory-layout information via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3766 SFBID76343 |
Severity: Medium |
Description: The kernel in Apple iOS before 8.4.1 and OS X before 10.10.5 does not properly restrict the mach_port_space_info interface, which allows attackers to obtain sensitive memory-layout information via a crafted app. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3800 |
Title: The DiskImages component in Apple iOS before 8.4.1 and OS X before 10.10.5 allows local users to gain privileges or cause a denial of service (memory corruption and application crash) via a malformed DMG image. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3800 SFBID76343 |
Severity: High |
Description: The DiskImages component in Apple iOS before 8.4.1 and OS X before 10.10.5 allows local users to gain privileges or cause a denial of service (memory corruption and application crash) via a malformed DMG image. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3752 |
Title: The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3752 SFBID76341 |
Severity: Medium |
Description: The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote attackers to obtain sensitive information via vectors involving (1) a cross-origin request or (2) a private-browsing request. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3756 |
Title: The Certificate UI in Apple iOS before 8.4.1 does not prevent X.509 certificate acceptance within the lock screen, which allows physically proximate attackers to establish arbitrary certificate trust relationships by completing a dialog. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3756 SFBID76337 |
Severity: Low |
Description: The Certificate UI in Apple iOS before 8.4.1 does not prevent X.509 certificate acceptance within the lock screen, which allows physically proximate attackers to establish arbitrary certificate trust relationships by completing a dialog. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3763 |
Title: Safari in Apple iOS before 8.4.1 does not limit the rate of JavaScript alert messages, which allows remote attackers to cause a denial of service (apparent browser locking) via a crafted web site. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3763 SFBID76337 |
Severity: Medium |
Description: Safari in Apple iOS before 8.4.1 does not limit the rate of JavaScript alert messages, which allows remote attackers to cause a denial of service (apparent browser locking) via a crafted web site. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5773 |
Title: QL Office in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted office document. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5773 SFBID76343 |
Severity: Medium |
Description: QL Office in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted office document. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5770 |
Title: MobileInstallation in Apple iOS before 8.4.1 does not ensure the uniqueness of universal provisioning profile bundle IDs, which allows attackers to replace arbitrary extensions via a crafted enterprise app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5770 SFBID76337 |
Severity: Medium |
Description: MobileInstallation in Apple iOS before 8.4.1 does not ensure the uniqueness of universal provisioning profile bundle IDs, which allows attackers to replace arbitrary extensions via a crafted enterprise app. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3759 |
Title: Location Framework in Apple iOS before 8.4.1 allows local users to bypass intended restrictions on filesystem modification via a symlink. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3759 SFBID76337 |
Severity: Medium |
Description: Location Framework in Apple iOS before 8.4.1 allows local users to bypass intended restrictions on filesystem modification via a symlink. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3795 |
Title: libxpc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app that sends a malformed XPC message. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3795 SFBID76343 |
Severity: High |
Description: libxpc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app that sends a malformed XPC message. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5757 |
Title: libpthread in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via an app that uses a crafted syscall to interfere with... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5757 SFBID76343 |
Severity: High |
Description: libpthread in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via an app that uses a crafted syscall to interfere with locking. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5776 |
Title: Libinfo in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by leveraging use of an AF_INET6 socket. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5776 SFBID76343 |
Severity: High |
Description: Libinfo in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by leveraging use of an AF_INET6 socket. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3776 |
Title: IOKit in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption and application crash) via a malformed plist. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3776 SFBID76343 |
Severity: High |
Description: IOKit in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption and application crash) via a malformed plist. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3768 |
Title: Integer overflow in the kernel in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context via a crafted app that makes unspecified IOKit API calls. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3768 SFBID76343 |
Severity: High |
Description: Integer overflow in the kernel in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context via a crafted app that makes unspecified IOKit API calls. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5782 |
Title: ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 does not properly initialize an unspecified data structure, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5782 SFBID76343 |
Severity: Medium |
Description: ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 does not properly initialize an unspecified data structure, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5781 |
Title: ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 does not properly initialize an unspecified data structure, which allows remote attackers to obtain sensitive information from process memory via a crafted PNG image. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5781 SFBID76343 |
Severity: Medium |
Description: ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 does not properly initialize an unspecified data structure, which allows remote attackers to obtain sensitive information from process memory via a crafted PNG image. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5758 |
Title: ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted TIFF image. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5758 SFBID76343 |
Severity: Medium |
Description: ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted TIFF image. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3804 |
Title: FontParser in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3804 SFBID76343 |
Severity: High |
Description: FontParser in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-5756 and CVE-2015-5775. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5756 |
Title: FontParser in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5756 SFBID76343 |
Severity: Medium |
Description: FontParser in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-3804 and CVE-2015-5775. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5775 |
Title: FontParser in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5775 SFBID76343 |
Severity: High |
Description: FontParser in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-3804 and CVE-2015-5756. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5766 |
Title: Directory traversal vulnerability in Air Traffic in Apple iOS before 8.4.1 allows attackers to access arbitrary filesystem locations via vectors related to asset handling. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5766 SFBID76337 |
Severity: Medium |
Description: Directory traversal vulnerability in Air Traffic in Apple iOS before 8.4.1 allows attackers to access arbitrary filesystem locations via vectors related to asset handling. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5755 |
Title: CoreText in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5755 SFBID76343 |
Severity: Medium |
Description: CoreText in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-5761. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5761 |
Title: CoreText in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5761 SFBID76343 |
Severity: Medium |
Description: CoreText in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-5755. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5777 |
Title: CoreMedia Playback in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5777 SFBID76343 |
Severity: Medium |
Description: CoreMedia Playback in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-5778. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5778 |
Title: CoreMedia Playback in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different... |
Type: Mobile Devices |
Bulletins:
CVE-2015-5778 SFBID76343 |
Severity: Medium |
Description: CoreMedia Playback in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-5777. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3782 |
Title: CloudKit in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to access an iCloud user record associated with a previous user's login session via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3782 SFBID76343 |
Severity: Medium |
Description: CloudKit in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to access an iCloud user record associated with a previous user's login session via a crafted app. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3793 |
Title: CFPreferences in Apple iOS before 8.4.1 allows attackers to bypass the third-party app-sandbox protection mechanism and read arbitrary managed preferences via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3793 SFBID76337 |
Severity: Medium |
Description: CFPreferences in Apple iOS before 8.4.1 allows attackers to bypass the third-party app-sandbox protection mechanism and read arbitrary managed preferences via a crafted app. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5774 |
Title: Buffer overflow in IOHIDFamily in Apple iOS before 8.4.1 and OS X before 10.10.5 allows local users to gain privileges via unspecified vectors. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5774 SFBID76343 |
Severity: High |
Description: Buffer overflow in IOHIDFamily in Apple iOS before 8.4.1 and OS X before 10.10.5 allows local users to gain privileges via unspecified vectors. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3778 |
Title: bootp in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to obtain potentially sensitive information about MAC addresses seen in previous Wi-Fi sessions by sniffing an 802.11 network for DNAv4 broadcast traffic. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3778 SFBID76337 |
Severity: Low |
Description: bootp in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to obtain potentially sensitive information about MAC addresses seen in previous Wi-Fi sessions by sniffing an 802.11 network for DNAv4 broadcast traffic. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5752 |
Title: Backup in Apple iOS before 8.4.1 allows attackers to bypass intended restrictions on filesystem access via a crafted app that creates a symlink. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5752 SFBID76337 |
Severity: Medium |
Description: Backup in Apple iOS before 8.4.1 allows attackers to bypass intended restrictions on filesystem access via a crafted app that creates a symlink. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5746 |
Title: AppleFileConduit in Apple iOS before 8.4.1 allows attackers to bypass intended restrictions on filesystem access via an afc command that leverages symlink mishandling. |
Type: Mobile Devices |
Bulletins:
CVE-2015-5746 SFBID76337 |
Severity: Medium |
Description: AppleFileConduit in Apple iOS before 8.4.1 allows attackers to bypass intended restrictions on filesystem access via an afc command that leverages symlink mishandling. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3803 |
Title: Apple iOS before 8.4.1 and OS X before 10.10.5 allow local users to bypass a code-signing protection mechanism via a crafted multi-architecture executable file. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3803 SFBID76343 |
Severity: High |
Description: Apple iOS before 8.4.1 and OS X before 10.10.5 allow local users to bypass a code-signing protection mechanism via a crafted multi-architecture executable file. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3802 |
Title: Apple iOS before 8.4.1 and OS X before 10.10.5 allow local users to bypass a code-signing protection mechanism via a crafted Mach-O file, a different vulnerability than CVE-2015-3805. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3802 SFBID76343 |
Severity: High |
Description: Apple iOS before 8.4.1 and OS X before 10.10.5 allow local users to bypass a code-signing protection mechanism via a crafted Mach-O file, a different vulnerability than CVE-2015-3805. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3805 |
Title: Apple iOS before 8.4.1 and OS X before 10.10.5 allow local users to bypass a code-signing protection mechanism via a crafted Mach-O file, a different vulnerability than CVE-2015-3802. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3805 SFBID76343 |
Severity: High |
Description: Apple iOS before 8.4.1 and OS X before 10.10.5 allow local users to bypass a code-signing protection mechanism via a crafted Mach-O file, a different vulnerability than CVE-2015-3802. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-3806 |
Title: Apple iOS before 8.4.1 and OS X before 10.10.5 allow local users to bypass a code-signing protection mechanism by appending code to a crafted executable file. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3806 SFBID76343 |
Severity: High |
Description: Apple iOS before 8.4.1 and OS X before 10.10.5 allow local users to bypass a code-signing protection mechanism by appending code to a crafted executable file. | ||||
Applies to: |
Created: 2015-08-16 |
Updated: 2024-09-07 |
ID: CVE-2015-1805 |
Title: The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1805 SFBID74951 |
Severity: High |
Description: The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." | ||||
Applies to: |
Created: 2015-08-08 |
Updated: 2024-09-07 |
ID: MITRE:28525 |
Title: Windows LoadLibrary EoP vulnerability |
Type: Software |
Bulletins:
MITRE:28525 CVE-2015-1758 |
Severity: Medium |
Description: Untrusted search path vulnerability in the LoadLibrary function in the kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a Trojan horse DLL in an unspecified directory, aka "Windows LoadLibrary EoP Vulnerability." | ||||
Applies to: |
Created: 2015-08-03 |
Updated: 2024-09-07 |
ID: MITRE:28971 |
Title: Vulnerability in Active Directory Federation Services could allow elevation of privilege |
Type: Software |
Bulletins:
MITRE:28971 CVE-2015-1757 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in adfs/ls in Active Directory Federation Services (AD FS) in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 allows remote attackers to inject arbitrary web script or HTML via the wct parameter, aka "ADFS XSS Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft Active Directory Federation Services |
Created: 2015-08-03 |
Updated: 2024-09-07 |
ID: MITRE:28607 |
Title: Exchange Server-Side Request Forgery vulnerability |
Type: Software |
Bulletins:
MITRE:28607 CVE-2015-1764 |
Severity: Medium |
Description: The web applications in Microsoft Exchange Server 2013 SP1 and Cumulative Update 8 allow remote attackers to bypass the Same Origin Policy and send HTTP traffic to intranet servers via a crafted request, related to a Server-Side Request Forgery (SSRF) issue, aka "Exchange Server-Side Request Forgery Vulnerability." | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-08-03 |
Updated: 2024-09-07 |
ID: MITRE:28928 |
Title: Exchange HTML injection vulnerability |
Type: Software |
Bulletins:
MITRE:28928 CVE-2015-2359 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in the web applications in Microsoft Exchange Server 2013 Cumulative Update 8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Exchange HTML Injection Vulnerability." | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-08-03 |
Updated: 2024-09-07 |
ID: MITRE:29115 |
Title: Exchange Cross-Site Request Forgery vulnerability |
Type: Software |
Bulletins:
MITRE:29115 CVE-2015-1771 |
Severity: Medium |
Description: Cross-site request forgery (CSRF) vulnerability in the web applications in Microsoft Exchange Server 2013 SP1 and Cumulative Update 8 allows remote attackers to hijack the authentication of arbitrary users, aka "Exchange Cross-Site Request Forgery Vulnerability." | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-08-03 |
Updated: 2024-09-07 |
ID: CVE-2015-4295 |
Title: The Prime Collaboration Deployment component in Cisco Unified Communications Manager 10.5(3.10000.9) allows remote authenticated users to discover root credentials via a direct request to an unspecified URL, aka Bug ID CSCuv21819. |
Type: Hardware |
Bulletins:
CVE-2015-4295 |
Severity: Medium |
Description: The Prime Collaboration Deployment component in Cisco Unified Communications Manager 10.5(3.10000.9) allows remote authenticated users to discover root credentials via a direct request to an unspecified URL, aka Bug ID CSCuv21819. | ||||
Applies to: Unified Communications Manager |
Created: 2015-07-31 |
Updated: 2024-09-07 |
ID: CVE-2015-4291 |
Title: Cisco IOS XE 2.x before 2.4.3 and 2.5.x before 2.5.1 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted series of fragmented (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCtd72617. |
Type: Hardware |
Bulletins:
CVE-2015-4291 |
Severity: High |
Description: Cisco IOS XE 2.x before 2.4.3 and 2.5.x before 2.5.1 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted series of fragmented (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCtd72617. | ||||
Applies to: |
Created: 2015-07-31 |
Updated: 2024-09-07 |
ID: CVE-2015-4293 |
Title: The packet-reassembly implementation in Cisco IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (CPU consumption or packet loss) via fragmented (1) IPv4 or (2) IPv6 packets that trigger ATTN-3-SYNC_TIMEOUT errors after... |
Type: Hardware |
Bulletins:
CVE-2015-4293 |
Severity: Medium |
Description: The packet-reassembly implementation in Cisco IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (CPU consumption or packet loss) via fragmented (1) IPv4 or (2) IPv6 packets that trigger ATTN-3-SYNC_TIMEOUT errors after reassembly failures, aka Bug ID CSCuo37957. | ||||
Applies to: |
Created: 2015-07-30 |
Updated: 2024-09-07 |
ID: MITRE:28910 |
Title: Windows Media Player RCE via DataObject vulnerability |
Type: Software |
Bulletins:
MITRE:28910 CVE-2015-1728 |
Severity: High |
Description: Microsoft Windows Media Player 10 through 12 allows remote attackers to execute arbitrary code via a crafted DataObject on a web site, aka "Windows Media Player RCE via DataObject Vulnerability." | ||||
Applies to: Windows Media Player |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29050 |
Title: Win32k Pool buffer overflow vulnerability |
Type: Software |
Bulletins:
MITRE:29050 CVE-2015-1727 |
Severity: High |
Description: Buffer overflow in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Pool Buffer Overflow Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29145 |
Title: Win32k Null pointer dereference vulnerability |
Type: Software |
Bulletins:
MITRE:29145 CVE-2015-1721 |
Severity: High |
Description: The kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application, aka "Win32k Null Pointer Dereference Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28508 |
Title: Win32k memory corruption elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28508 CVE-2015-1768 |
Severity: High |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28994 |
Title: Win32k elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28994 CVE-2015-2360 |
Severity: High |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28665 |
Title: Win32k buffer overflow vulnerability |
Type: Software |
Bulletins:
MITRE:28665 CVE-2015-1725 |
Severity: High |
Description: Buffer overflow in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Buffer Overflow Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29067 |
Title: Microsoft Windows Station use after free vulnerability |
Type: Software |
Bulletins:
MITRE:29067 CVE-2015-1723 |
Severity: High |
Description: Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Station Use After Free Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29118 |
Title: Microsoft Windows Kernel use after free vulnerability |
Type: Software |
Bulletins:
MITRE:29118 CVE-2015-1720 |
Severity: High |
Description: Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Use After Free Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29124 |
Title: Microsoft Windows Kernel Object use after free vulnerability |
Type: Software |
Bulletins:
MITRE:29124 CVE-2015-1724 |
Severity: High |
Description: Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Object Use After Free Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29093 |
Title: Microsoft Windows Kernel information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:29093 CVE-2015-1719 |
Severity: Low |
Description: The kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to obtain sensitive information from kernel memory via a crafted application, aka "Microsoft Windows Kernel Information Disclosure Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28201 |
Title: Microsoft Windows Kernel Brush Object use after free vulnerability |
Type: Software |
Bulletins:
MITRE:28201 CVE-2015-1726 |
Severity: High |
Description: Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Brush Object Use After Free Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28806 |
Title: Microsoft Windows Kernel Bitmap handling use after free vulnerability |
Type: Software |
Bulletins:
MITRE:28806 CVE-2015-1722 |
Severity: High |
Description: Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Bitmap Handling Use After Free Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28531 |
Title: Microsoft Office uninitialized memory use vulnerability |
Type: Software |
Bulletins:
MITRE:28531 CVE-2015-1770 |
Severity: High |
Description: Microsoft Office 2013 SP1 and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Uninitialized Memory Use Vulnerability." | ||||
Applies to: Microsoft Office 2013 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28513 |
Title: Microsoft Office memory corruption vulnerability |
Type: Miscellaneous |
Bulletins:
MITRE:28513 CVE-2015-1760 |
Severity: High |
Description: Microsoft Office Compatibility Pack SP3, Office 2010 SP2, Office 2013 SP1, and Office 2013 RT SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Office 2010 Microsoft Office 2013 Microsoft Office Compatibility Pack |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28744 |
Title: Microsoft Office memory corruption vulnerability |
Type: Miscellaneous |
Bulletins:
MITRE:28744 CVE-2015-1759 |
Severity: High |
Description: Microsoft Office Compatibility Pack SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Office Compatibility Pack |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29072 |
Title: Microsoft common control use after free vulnerability |
Type: Software |
Bulletins:
MITRE:29072 CVE-2015-1756 |
Severity: High |
Description: Use-after-free vulnerability in Microsoft Common Controls in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted web site that is accessed with the F12 Developer Tools feature of Internet Explorer, aka "Microsoft Common Control Use After Free Vulnerability." | ||||
Applies to: |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28848 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28848 CVE-2015-1744 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1735, CVE-2015-1740, CVE-2015-1745, and CVE-2015-1766. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28889 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28889 CVE-2015-1736 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1731, CVE-2015-1737, and CVE-2015-1755. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28948 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28948 CVE-2015-1755 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1731, CVE-2015-1736, and CVE-2015-1737. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28512 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28512 CVE-2015-1752 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1741. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28518 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28518 CVE-2015-1745 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1735, CVE-2015-1740, CVE-2015-1744, and CVE-2015-1766. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28530 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28530 CVE-2015-1731 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1736, CVE-2015-1737, and CVE-2015-1755. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28610 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28610 CVE-2015-1730 |
Severity: High |
Description: Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28593 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28593 CVE-2015-1750 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1732, CVE-2015-1742, CVE-2015-1747, and CVE-2015-1753. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28650 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28650 CVE-2015-1741 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1752. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28724 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28724 CVE-2015-1754 |
Severity: High |
Description: Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 8 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28769 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28769 CVE-2015-1737 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1731, CVE-2015-1736, and CVE-2015-1755. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29033 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29033 CVE-2015-1732 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1742, CVE-2015-1747, CVE-2015-1750, and CVE-2015-1753. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29057 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29057 CVE-2015-1747 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1732, CVE-2015-1742, CVE-2015-1750, and CVE-2015-1753. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29060 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29060 CVE-2015-1751 |
Severity: High |
Description: Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29061 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29061 CVE-2015-1753 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1732, CVE-2015-1742, CVE-2015-1747, and CVE-2015-1750. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29076 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29076 CVE-2015-1766 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1735, CVE-2015-1740, CVE-2015-1744, and CVE-2015-1745. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29081 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29081 CVE-2015-1687 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29113 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29113 CVE-2015-1735 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1740, CVE-2015-1744, CVE-2015-1745, and CVE-2015-1766. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29119 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29119 CVE-2015-1742 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1732, CVE-2015-1747, CVE-2015-1750, and CVE-2015-1753. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29123 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:29123 CVE-2015-1740 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1735, CVE-2015-1744, CVE-2015-1745, and CVE-2015-1766. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:28429 |
Title: Internet Explorer information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28429 CVE-2015-1765 |
Severity: Medium |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to read the browser history via a crafted web site. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29005 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Web |
Bulletins:
MITRE:29005 CVE-2015-1748 |
Severity: Medium |
Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-1743. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29142 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:29142 CVE-2015-1739 |
Severity: Medium |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: MITRE:29147 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Web |
Bulletins:
MITRE:29147 CVE-2015-1743 |
Severity: Medium |
Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-1748. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-27 |
Updated: 2024-09-07 |
ID: CVE-2015-0681 |
Title: The TFTP server in Cisco IOS 12.2(44)SQ1, 12.2(33)XN1, 12.4(25e)JAM1, 12.4(25e)JAO5m, 12.4(23)JY, 15.0(2)ED1, 15.0(2)EY3, 15.1(3)SVF4a, and 15.2(2)JB1 and IOS XE 2.5.x, 2.6.x, 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, and 3.5.xS before 3.6.0S; 3.1.xSG,... |
Type: Hardware |
Bulletins:
CVE-2015-0681 |
Severity: High |
Description: The TFTP server in Cisco IOS 12.2(44)SQ1, 12.2(33)XN1, 12.4(25e)JAM1, 12.4(25e)JAO5m, 12.4(23)JY, 15.0(2)ED1, 15.0(2)EY3, 15.1(3)SVF4a, and 15.2(2)JB1 and IOS XE 2.5.x, 2.6.x, 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, and 3.5.xS before 3.6.0S; 3.1.xSG, 3.2.xSG, and 3.3.xSG before 3.4.0SG; 3.2.xSE before 3.3.0SE; 3.2.xXO before 3.3.0XO; 3.2.xSQ; 3.3.xSQ; and 3.4.xSQ allows remote attackers to cause a denial of service (device hang or reload) via multiple requests that trigger improper memory management, aka Bug ID CSCts66733. | ||||
Applies to: |
Created: 2015-07-24 |
Updated: 2024-09-07 |
ID: CVE-2015-4285 |
Title: The Local Packet Transport Services (LPTS) implementation in Cisco IOS XR 5.1.2, 5.1.3, 5.2.1, and 5.2.2 on ASR9k devices makes incorrect decisions about the opening of TCP and UDP ports during the processing of flow base entries, which allows... |
Type: Hardware |
Bulletins:
CVE-2015-4285 |
Severity: Medium |
Description: The Local Packet Transport Services (LPTS) implementation in Cisco IOS XR 5.1.2, 5.1.3, 5.2.1, and 5.2.2 on ASR9k devices makes incorrect decisions about the opening of TCP and UDP ports during the processing of flow base entries, which allows remote attackers to cause a denial of service (resource consumption) by sending traffic to these ports continuously, aka Bug ID CSCur88273. | ||||
Applies to: |
Created: 2015-07-23 |
Updated: 2024-09-07 |
ID: CVE-2015-4284 |
Title: The Concurrent Data Management Replication process in Cisco IOS XR 5.3.0 on ASR 9000 devices allows remote attackers to cause a denial of service (BGP process reload) via malformed BGPv4 packets, aka Bug ID CSCur70670. |
Type: Hardware |
Bulletins:
CVE-2015-4284 SFBID75980 |
Severity: Medium |
Description: The Concurrent Data Management Replication process in Cisco IOS XR 5.3.0 on ASR 9000 devices allows remote attackers to cause a denial of service (BGP process reload) via malformed BGPv4 packets, aka Bug ID CSCur70670. | ||||
Applies to: |
Created: 2015-07-22 |
Updated: 2024-09-07 |
ID: CVE-2015-5363 |
Title: The SRX Network Security Daemon (nsd) in Juniper SRX Series services gateways with Junos 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, and 12.3X48 before 12.3X48-D15 allows remote DNS servers to cause a denial... |
Type: Hardware |
Bulletins:
CVE-2015-5363 |
Severity: Medium |
Description: The SRX Network Security Daemon (nsd) in Juniper SRX Series services gateways with Junos 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, and 12.3X48 before 12.3X48-D15 allows remote DNS servers to cause a denial of service (crash) via a crafted DNS response. | ||||
Applies to: |
Created: 2015-07-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5357 |
Title: The Juniper EX4600, QFX3500, QFX3600, and QFX5100 switches with Junos 13.2X51-D15 through 13.2X51-D25, 13.2X51 before 13.2X51-D30, and 14.1X53 before 14.1X53-D10 allows remote attackers to cause a denial of service (CPU consumption) via unspecified... |
Type: Hardware |
Bulletins:
CVE-2015-5357 |
Severity: Medium |
Description: The Juniper EX4600, QFX3500, QFX3600, and QFX5100 switches with Junos 13.2X51-D15 through 13.2X51-D25, 13.2X51 before 13.2X51-D30, and 14.1X53 before 14.1X53-D10 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors. | ||||
Applies to: |
Created: 2015-07-16 |
Updated: 2024-09-07 |
ID: CVE-2015-5360 |
Title: IPv6 sendd in Juniper Junos 12.1X44 before 12.1X44-D51, 12.1X46 before 12.1X46-D36, 12.1X46 before 12.1X46-D40, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D20, 13.2 before 13.2R8, 13.3 before 13.3R6, 14.1 before 14.1R5,... |
Type: Hardware |
Bulletins:
CVE-2015-5360 |
Severity: Medium |
Description: IPv6 sendd in Juniper Junos 12.1X44 before 12.1X44-D51, 12.1X46 before 12.1X46-D36, 12.1X46 before 12.1X46-D40, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D20, 13.2 before 13.2R8, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.2 before 14.2R3, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D20, when the "set protocols neighbor-discovery secure security-level default" option is configured, allows remote attackers to cause a denial of service (CPU consumption) via a crafted Secure Neighbor Discovery (SEND) Protocol packet. | ||||
Applies to: |
Created: 2015-07-16 |
Updated: 2024-09-07 |
ID: CVE-2015-4269 |
Title: The Tomcat throttling feature in Cisco Unified Communications Manager 10.5(1.99995.9) allows remote authenticated users to cause a denial of service (management outage) by sending many requests, aka Bug ID CSCuu99709. |
Type: Hardware |
Bulletins:
CVE-2015-4269 |
Severity: Medium |
Description: The Tomcat throttling feature in Cisco Unified Communications Manager 10.5(1.99995.9) allows remote authenticated users to cause a denial of service (management outage) by sending many requests, aka Bug ID CSCuu99709. | ||||
Applies to: Unified Communications Manager |
Created: 2015-07-14 |
Updated: 2024-09-07 |
ID: CVE-2015-3007 |
Title: The Juniper SRX Series services gateways with Junos OS 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, and 12.3X48 before 12.3X48-D15 do not properly implement the "set system ports console insecure" feature, which allows physically... |
Type: Hardware |
Bulletins:
CVE-2015-3007 |
Severity: High |
Description: The Juniper SRX Series services gateways with Junos OS 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, and 12.3X48 before 12.3X48-D15 do not properly implement the "set system ports console insecure" feature, which allows physically proximate attackers to gain administrative privileges by leveraging access to the console port. | ||||
Applies to: |
Created: 2015-07-14 |
Updated: 2024-09-07 |
ID: CVE-2015-5362 |
Title: The BFD daemon in Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R8, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X50 before... |
Type: Hardware |
Bulletins:
CVE-2015-5362 |
Severity: High |
Description: The BFD daemon in Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R8, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X50 before 14.1X50-D85, 14.1X55 before 14.1X55-D20, 14.2 before 14.2R3, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D10 allows remote attackers to cause a denial of service (bfdd crash and restart) or execute arbitrary code via a crafted BFD packet. | ||||
Applies to: |
Created: 2015-07-14 |
Updated: 2024-09-07 |
ID: CVE-2015-4272 |
Title: Multiple cross-site scripting (XSS) vulnerabilities in the ccmivr page in Cisco Unified Communications Manager (formerly CallManager) 10.5(2.10000.5) allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, aka Bug ID... |
Type: Hardware |
Bulletins:
CVE-2015-4272 |
Severity: Medium |
Description: Multiple cross-site scripting (XSS) vulnerabilities in the ccmivr page in Cisco Unified Communications Manager (formerly CallManager) 10.5(2.10000.5) allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, aka Bug ID CSCut19580. | ||||
Applies to: Unified Communications Manager |
Created: 2015-07-14 |
Updated: 2024-09-07 |
ID: CVE-2015-5358 |
Title: Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.2X52 before 13.2X52-D25, 13.3 before 13.3R6,... |
Type: Hardware |
Bulletins:
CVE-2015-5358 |
Severity: High |
Description: Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.2X52 before 13.2X52-D25, 13.3 before 13.3R6, 14.1R3 before 14.1R3-S2, 14.1 before 14.1R4, 14.1X53 before 14.1X53-D12, 14.1X53 before 14.1X53-D16, 14.1X55 before 14.1X55-D25, 14.2 before 14.2R2, and 15.1 before 15.1R1 allows remote attackers to cause a denial of service (mbuf and connection consumption and restart) via a large number of requests that trigger a TCP connection to move to the LAST_ACK state when there is more data to send. | ||||
Applies to: |
Created: 2015-07-14 |
Updated: 2024-09-07 |
ID: CVE-2015-5359 |
Title: Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R7, 13.3 before 13.3R5, 14.1R3 before 14.1R3-S2, 14.1 before 14.1R4, 14.2 before... |
Type: Hardware |
Bulletins:
CVE-2015-5359 |
Severity: High |
Description: Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R7, 13.3 before 13.3R5, 14.1R3 before 14.1R3-S2, 14.1 before 14.1R4, 14.2 before 14.2R2, and 15.1 before 15.1R1 allows remote attackers to cause a denial of service (NULL pointer dereference and RDP crash) via a large number of BGP-VPLS advertisements with updated BGP local preference values. | ||||
Applies to: |
Created: 2015-07-14 |
Updated: 2024-09-07 |
ID: CVE-2015-4243 |
Title: The PPPoE establishment implementation in Cisco IOS XE 3.5.0S on ASR 1000 devices allows remote attackers to cause a denial of service (device reload) by sending malformed PPPoE Active Discovery Request (PADR) packets on the local network, aka Bug... |
Type: Hardware |
Bulletins:
CVE-2015-4243 |
Severity: Medium |
Description: The PPPoE establishment implementation in Cisco IOS XE 3.5.0S on ASR 1000 devices allows remote attackers to cause a denial of service (device reload) by sending malformed PPPoE Active Discovery Request (PADR) packets on the local network, aka Bug ID CSCty94202. | ||||
Applies to: |
Created: 2015-07-08 |
Updated: 2024-09-07 |
ID: MITRE:28699 |
Title: Windows Kernel security feature bypass vulnerability |
Type: Software |
Bulletins:
MITRE:28699 CVE-2015-1674 |
Severity: Medium |
Description: The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate an unspecified address, which allows local users to bypass the KASLR protection mechanism, and consequently discover the cng.sys base address, via a crafted application, aka "Windows Kernel Security Feature Bypass Vulnerability." | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28936 |
Title: Windows Journal remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28936 CVE-2015-1699 |
Severity: High |
Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1675, CVE-2015-1695, CVE-2015-1696, CVE-2015-1697, and CVE-2015-1698. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28517 |
Title: Windows Journal remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28517 CVE-2015-1695 |
Severity: High |
Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1675, CVE-2015-1696, CVE-2015-1697, CVE-2015-1698, and CVE-2015-1699. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28649 |
Title: Windows Journal remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28649 CVE-2015-1698 |
Severity: High |
Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1675, CVE-2015-1695, CVE-2015-1696, CVE-2015-1697, and CVE-2015-1699. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28710 |
Title: Windows Journal remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28710 CVE-2015-1696 |
Severity: High |
Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1675, CVE-2015-1695, CVE-2015-1697, CVE-2015-1698, and CVE-2015-1699. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28742 |
Title: Windows Journal remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28742 CVE-2015-1675 |
Severity: High |
Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1695, CVE-2015-1696, CVE-2015-1697, CVE-2015-1698, and CVE-2015-1699. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28390 |
Title: Windows Journal remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28390 CVE-2015-1697 |
Severity: High |
Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1675, CVE-2015-1695, CVE-2015-1696, CVE-2015-1698, and CVE-2015-1699. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28950 |
Title: Windows forms elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28950 CVE-2015-1673 |
Severity: High |
Description: The Windows Forms (aka WinForms) libraries in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 allow user-assisted remote attackers to execute arbitrary code via a crafted partial-trust application, aka "Windows Forms Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft .NET Framework 1.1 Microsoft .NET Framework 2.0 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.0 Microsoft .NET Framework 4.5 Microsoft .NET Framework 4.5.1 Microsoft .NET Framework 4.5.2 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28867 |
Title: VBScript memory corruption vulnerability |
Type: Miscellaneous |
Bulletins:
MITRE:28867 CVE-2015-1684 |
Severity: Medium |
Description: VBScript.dll in the Microsoft VBScript 5.6 through 5.8 engine, as used in Internet Explorer 8 through 11 and other products, allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript ASLR Bypass." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 VBScript 5.6 VBScript 5.7 VBScript 5.8 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28745 |
Title: VBScript and JScript ASLR bypass vulnerability |
Type: Software |
Bulletins:
MITRE:28745 CVE-2015-1686 |
Severity: Medium |
Description: The Microsoft (1) VBScript 5.6 through 5.8 and (2) JScript 5.6 through 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript and JScript ASLR Bypass." | ||||
Applies to: JScript 5.6 JScript 5.7 JScript 5.8 Microsoft Internet Explorer 10 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 VBScript 5.6 VBScript 5.7 VBScript 5.8 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28207 |
Title: TrueType font parsing vulnerability |
Type: Software |
Bulletins:
MITRE:28207 CVE-2015-1671 |
Severity: High |
Description: The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability." | ||||
Applies to: Microsoft .NET Framework 3.0 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.0 Microsoft .NET Framework 4.5 Microsoft .NET Framework 4.5.1 Microsoft .NET Framework 4.5.2 Microsoft Lync 2010 Microsoft Lync Basic 2013 Microsoft Silverlight 5 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28932 |
Title: Service control manager elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28932 CVE-2015-1702 |
Severity: Medium |
Description: The Service Control Manager (SCM) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Service Control Manager Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28672 |
Title: Schannel information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28672 CVE-2015-1716 |
Severity: Medium |
Description: Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict Diffie-Hellman Ephemeral (DHE) key lengths, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, aka "Schannel Information Disclosure Vulnerability." | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28362 |
Title: OpenType Font parsing vulnerability |
Type: Software |
Bulletins:
MITRE:28362 CVE-2015-1670 |
Severity: Medium |
Description: The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2, allows remote attackers to obtain sensitive information from process memory via a crafted OpenType font on a web site, aka "OpenType Font Parsing Vulnerability." | ||||
Applies to: Microsoft .NET Framework 3.0 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.0 Microsoft .NET Framework 4.5 Microsoft .NET Framework 4.5.1 Microsoft .NET Framework 4.5.2 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28068 |
Title: Microsoft windows kernel memory disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28068 CVE-2015-1678 |
Severity: Low |
Description: The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1679, and CVE-2015-1680. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28876 |
Title: Microsoft windows kernel memory disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28876 CVE-2015-1677 |
Severity: Low |
Description: The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1678, CVE-2015-1679, and CVE-2015-1680. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28808 |
Title: Microsoft windows kernel memory disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28808 CVE-2015-1680 |
Severity: Low |
Description: The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1678, and CVE-2015-1679. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28883 |
Title: Microsoft windows kernel memory disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28883 CVE-2015-1701 |
Severity: High |
Description: Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28555 |
Title: Microsoft windows kernel memory disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28555 CVE-2015-1679 |
Severity: Low |
Description: The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1678, and CVE-2015-1680. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:29001 |
Title: Microsoft windows kernel memory disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:29001 CVE-2015-1676 |
Severity: Low |
Description: The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1677, CVE-2015-1678, CVE-2015-1679, and CVE-2015-1680. | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28985 |
Title: Microsoft Silverlight out of browser application vulnerability |
Type: Software |
Bulletins:
MITRE:28985 CVE-2015-1715 |
Severity: High |
Description: Microsoft Silverlight 5 before 5.1.40416.00 allows remote attackers to bypass intended integrity-level restrictions via a crafted Silverlight application, aka "Microsoft Silverlight Out of Browser Application Vulnerability." | ||||
Applies to: Microsoft Silverlight 5 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28924 |
Title: Microsoft SharePoint page content vulnerabilities |
Type: Services |
Bulletins:
MITRE:28924 CVE-2015-1700 |
Severity: Medium |
Description: Microsoft SharePoint Server 2007 SP3, SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, and SharePoint Foundation 2013 SP1 allow remote authenticated users to execute arbitrary code via crafted page content, aka "Microsoft SharePoint Page Content Vulnerabilities." | ||||
Applies to: Microsoft SharePoint Foundation 2010 Microsoft SharePoint Foundation 2013 Microsoft SharePoint Server 2007 Microsoft SharePoint Server 2010 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28645 |
Title: Microsoft Office memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28645 CVE-2015-1682 |
Severity: High |
Description: Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Office 2013 RT SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office for Mac 2011, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, PowerPoint Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Excel Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, Excel Web App 2010 SP2, Office Web Apps Server 2013 SP1, SharePoint Foundation 2010 SP2, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Excel 2010 Microsoft Excel 2013 Microsoft Office 2010 Microsoft Office 2013 Microsoft Office Web Apps 2010 Microsoft Office Web Apps Server 2013 Microsoft PowerPoint 2010 Microsoft PowerPoint 2013 Microsoft SharePoint Foundation 2010 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28723 |
Title: Microsoft Office memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28723 CVE-2015-1683 |
Severity: High |
Description: Microsoft Office 2007 SP3 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Office 2007 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:29018 |
Title: Microsoft Management Console file format denial of service vulnerability |
Type: Software |
Bulletins:
MITRE:29018 CVE-2015-1681 |
Severity: Low |
Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to cause a denial of service via a crafted .msc file, aka "Microsoft Management Console File Format Denial of Service Vulnerability." | ||||
Applies to: |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28840 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28840 CVE-2015-1712 |
Severity: High |
Description: Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1691. | ||||
Applies to: Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28917 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28917 CVE-2015-1718 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1658, CVE-2015-1706, CVE-2015-1711, and CVE-2015-1717. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28951 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28951 CVE-2015-1705 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1689. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28473 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28473 CVE-2015-1708 |
Severity: High |
Description: Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28576 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28576 CVE-2015-1694 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1710. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28641 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28641 CVE-2015-1688 |
Severity: Medium |
Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28680 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28680 CVE-2015-1714 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28753 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28753 CVE-2015-1689 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1705. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28340 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28340 CVE-2015-1691 |
Severity: High |
Description: Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1712. | ||||
Applies to: Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28984 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28984 CVE-2015-1709 |
Severity: High |
Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28162 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28162 CVE-2015-1706 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1658, CVE-2015-1711, CVE-2015-1717, and CVE-2015-1718. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28167 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28167 CVE-2015-1711 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1658, CVE-2015-1706, CVE-2015-1717, and CVE-2015-1718. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28405 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28405 CVE-2015-1710 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1694. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28993 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28993 CVE-2015-1717 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1658, CVE-2015-1706, CVE-2015-1711, and CVE-2015-1718. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:29000 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:29000 CVE-2015-1658 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1706, CVE-2015-1711, CVE-2015-1717, and CVE-2015-1718. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28815 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Web |
Bulletins:
MITRE:28815 CVE-2015-1704 |
Severity: Medium |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-1703. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28829 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28829 CVE-2015-1713 |
Severity: Medium |
Description: Microsoft Internet Explorer 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28692 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Web |
Bulletins:
MITRE:28692 CVE-2015-1703 |
Severity: Medium |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-1704. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28822 |
Title: Internet Explorer clipboard information disclosure vulnerability |
Type: Web |
Bulletins:
MITRE:28822 CVE-2015-1692 |
Severity: Medium |
Description: Microsoft Internet Explorer 7 through 11 allows user-assisted remote attackers to read the clipboard contents via crafted web script, aka "Internet Explorer Clipboard Information Disclosure Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:29016 |
Title: Internet Explorer ASLR bypass vulnerability |
Type: Software |
Bulletins:
MITRE:29016 CVE-2015-1685 |
Severity: Medium |
Description: Microsoft Internet Explorer 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass." | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: MITRE:28739 |
Title: .NET XML decryption denial of service vulnerability |
Type: Software |
Bulletins:
MITRE:28739 CVE-2015-1672 |
Severity: Medium |
Description: Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 allows remote attackers to cause a denial of service (recursion and performance degradation) via crafted encrypted data in an XML document, aka ".NET XML Decryption Denial of Service Vulnerability." | ||||
Applies to: Microsoft .NET Framework 2.0 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.0 Microsoft .NET Framework 4.5 Microsoft .NET Framework 4.5.1 Microsoft .NET Framework 4.5.2 |
Created: 2015-07-06 |
Updated: 2024-09-07 |
ID: CVE-2015-4231 |
Title: The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416. |
Type: Hardware |
Bulletins:
CVE-2015-4231 |
Severity: Low |
Description: The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416. | ||||
Applies to: |
Created: 2015-07-03 |
Updated: 2024-09-07 |
ID: CVE-2015-4237 |
Title: The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491,... |
Type: Hardware |
Bulletins:
CVE-2015-4237 |
Severity: Medium |
Description: The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv08434, and CSCuv08436. | ||||
Applies to: |
Created: 2015-07-03 |
Updated: 2024-09-07 |
ID: CVE-2015-4232 |
Title: Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856. |
Type: Hardware |
Bulletins:
CVE-2015-4232 SFBID75503 |
Severity: Medium |
Description: Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856. | ||||
Applies to: |
Created: 2015-07-03 |
Updated: 2024-09-07 |
ID: CVE-2015-4234 |
Title: Cisco NX-OS 6.0(2) and 6.2(2) on Nexus devices has an improper OS configuration, which allows local users to obtain root access via unspecified input to the Python interpreter, aka Bug IDs CSCun02887, CSCur00115, and CSCur00127. |
Type: Hardware |
Bulletins:
CVE-2015-4234 SFBID75502 |
Severity: High |
Description: Cisco NX-OS 6.0(2) and 6.2(2) on Nexus devices has an improper OS configuration, which allows local users to obtain root access via unspecified input to the Python interpreter, aka Bug IDs CSCun02887, CSCur00115, and CSCur00127. | ||||
Applies to: |
Created: 2015-07-03 |
Updated: 2024-09-07 |
ID: CVE-2015-3727 |
Title: WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict rename operations on WebSQL tables, which allows remote attackers to access... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3727 SFBID75492 |
Severity: Medium |
Description: WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict rename operations on WebSQL tables, which allows remote attackers to access an arbitrary web site's database via a crafted web site. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3719 |
Title: TrueTypeScaler in FontParser in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3719 SFBID75491 |
Severity: Medium |
Description: TrueTypeScaler in FontParser in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-3694. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3728 |
Title: The WiFi Connectivity feature in Apple iOS before 8.4 allows remote Wi-Fi access points to trigger an automatic association, with an arbitrary security type, by operating with a recognized ESSID within an 802.11 network's coverage area. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3728 SFBID75490 |
Severity: Medium |
Description: The WiFi Connectivity feature in Apple iOS before 8.4 allows remote Wi-Fi access points to trigger an automatic association, with an arbitrary security type, by operating with a recognized ESSID within an 802.11 network's coverage area. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3726 |
Title: The Telephony subsystem in Apple iOS before 8.4 allows physically proximate attackers to execute arbitrary code via a crafted (1) SIM or (2) UIM card. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3726 SFBID75490 |
Severity: Medium |
Description: The Telephony subsystem in Apple iOS before 8.4 allows physically proximate attackers to execute arbitrary code via a crafted (1) SIM or (2) UIM card. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3659 |
Title: The SQLite authorizer in the Storage functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict access to SQL... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3659 SFBID75492 |
Severity: Medium |
Description: The SQLite authorizer in the Storage functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict access to SQL functions, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3658 |
Title: The Page Loading functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly consider redirects during decisions about sending an... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3658 SFBID75492 |
Severity: Medium |
Description: The Page Loading functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly consider redirects during decisions about sending an Origin header, which makes it easier for remote attackers to bypass CSRF protection mechanisms via a crafted web site. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3721 |
Title: The kernel in Apple iOS before 8.4 and OS X before 10.10.4 does not properly handle HFS parameters, which allows attackers to obtain sensitive memory-layout information via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3721 SFBID75491 |
Severity: Medium |
Description: The kernel in Apple iOS before 8.4 and OS X before 10.10.4 does not properly handle HFS parameters, which allows attackers to obtain sensitive memory-layout information via a crafted app. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3684 |
Title: The HTTPAuthentication implementation in CFNetwork in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted credentials in a URL. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3684 SFBID75491 |
Severity: Medium |
Description: The HTTPAuthentication implementation in CFNetwork in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted credentials in a URL. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3690 |
Title: The DiskImages subsystem in Apple iOS before 8.4 and OS X before 10.10.4 allows attackers to obtain sensitive memory-layout information for the kernel via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3690 SFBID75491 |
Severity: Medium |
Description: The DiskImages subsystem in Apple iOS before 8.4 and OS X before 10.10.4 allows attackers to obtain sensitive memory-layout information for the kernel via a crafted app. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3725 |
Title: MobileInstallation in Apple iOS before 8.4 does not ensure the uniqueness of Watch bundle IDs, which allows attackers to cause a denial of service (ID collision and Watch launch outage) via a crafted universal provisioning profile app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3725 SFBID75490 |
Severity: Medium |
Description: MobileInstallation in Apple iOS before 8.4 does not ensure the uniqueness of Watch bundle IDs, which allows attackers to cause a denial of service (ID collision and Watch launch outage) via a crafted universal provisioning profile app. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3710 |
Title: Mail in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to trigger a refresh operation, and consequently cause a visit to an arbitrary web site, via a crafted HTML e-mail message. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3710 SFBID75491 |
Severity: Medium |
Description: Mail in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to trigger a refresh operation, and consequently cause a visit to an arbitrary web site, via a crafted HTML e-mail message. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3703 |
Title: ImageIO in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TIFF image. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3703 SFBID75491 |
Severity: Medium |
Description: ImageIO in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TIFF image. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3694 |
Title: FontParser in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-3719. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3694 SFBID75491 |
Severity: Medium |
Description: FontParser in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-3719. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3685 |
Title: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3686,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3685 SFBID75491 |
Severity: Medium |
Description: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3686, CVE-2015-3687, CVE-2015-3688, and CVE-2015-3689. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3686 |
Title: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3686 SFBID75491 |
Severity: Medium |
Description: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3687, CVE-2015-3688, and CVE-2015-3689. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3687 |
Title: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3687 SFBID75491 |
Severity: Medium |
Description: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3688, and CVE-2015-3689. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3688 |
Title: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3688 SFBID75491 |
Severity: Medium |
Description: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3687, and CVE-2015-3689. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3689 |
Title: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685,... |
Type: Mobile Devices |
Bulletins:
CVE-2015-3689 SFBID75491 |
Severity: Medium |
Description: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3687, and CVE-2015-3688. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3723 |
Title: CoreGraphics in Apple iOS before 8.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted ICC profile in a PDF document, a different vulnerability than CVE-2015-3724. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3723 SFBID75490 |
Severity: Medium |
Description: CoreGraphics in Apple iOS before 8.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted ICC profile in a PDF document, a different vulnerability than CVE-2015-3724. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3724 |
Title: CoreGraphics in Apple iOS before 8.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted ICC profile in a PDF document, a different vulnerability than CVE-2015-3723. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3724 SFBID75490 |
Severity: Medium |
Description: CoreGraphics in Apple iOS before 8.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted ICC profile in a PDF document, a different vulnerability than CVE-2015-3723. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: CVE-2015-3722 |
Title: Application Store in Apple iOS before 8.4 does not ensure the uniqueness of bundle IDs, which allows attackers to cause a denial of service (ID collision and launch outage) via a crafted universal provisioning profile app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-3722 SFBID75490 |
Severity: Medium |
Description: Application Store in Apple iOS before 8.4 does not ensure the uniqueness of bundle IDs, which allows attackers to cause a denial of service (ID collision and launch outage) via a crafted universal provisioning profile app. | ||||
Applies to: |
Created: 2015-07-02 |
Updated: 2024-09-07 |
ID: MITRE:29136 |
Title: RHSA-2015:0809 -- java-1.8.0-openjdk security update |
Type: Software |
Bulletins:
MITRE:29136 |
Severity: Low |
Description: The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) | ||||
Applies to: java-1.8.0-openjdk |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29140 |
Title: RHSA-2015:0808 -- java-1.6.0-openjdk security update |
Type: Software |
Bulletins:
MITRE:29140 |
Severity: Low |
Description: The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Java Software Development Kit. An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) | ||||
Applies to: java-1.6.0-openjdk |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29084 |
Title: RHSA-2015:0807 -- java-1.7.0-openjdk security update |
Type: Software |
Bulletins:
MITRE:29084 |
Severity: Low |
Description: The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) | ||||
Applies to: java-1.7.0-openjdk |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28599 |
Title: RHSA-2015:0806 -- java-1.7.0-openjdk security update |
Type: Software |
Bulletins:
MITRE:28599 |
Severity: Low |
Description: The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) | ||||
Applies to: java-1.7.0-openjdk |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29248 |
Title: RHSA-2015:0803 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:29248 |
Severity: Low |
Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28514 |
Title: RHSA-2015:0800 -- openssl security update |
Type: Web |
Bulletins:
MITRE:28514 |
Severity: Low |
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. It was discovered that OpenSSL would accept ephemeral RSA keys when using non-export RSA cipher suites. A malicious server could make a TLS/SSL client using OpenSSL use a weaker key exchange method. (CVE-2015-0204) | ||||
Applies to: openssl |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29342 |
Title: RHSA-2009:1674 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29342 |
Severity: Low |
Description: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. | ||||
Applies to: firefox xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28862 |
Title: RHSA-2009:1670 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:28862 |
Severity: Low |
Description: Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29266 |
Title: RHSA-2009:1648 -- ntp security update |
Type: Miscellaneous |
Bulletins:
MITRE:29266 |
Severity: Low |
Description: An updated ntp package that fixes a security issue is now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. | ||||
Applies to: ntp |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29283 |
Title: RHSA-2009:1646 -- libtool security update |
Type: Miscellaneous |
Bulletins:
MITRE:29283 |
Severity: Low |
Description: Updated libtool packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. | ||||
Applies to: libtool |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29263 |
Title: RHSA-2009:1642 -- acpid security update |
Type: Services |
Bulletins:
MITRE:29263 |
Severity: Low |
Description: An updated acpid package that fixes one security issue is now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. | ||||
Applies to: acpid |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29347 |
Title: RHSA-2009:1625 -- expat security update |
Type: Miscellaneous |
Bulletins:
MITRE:29347 |
Severity: Low |
Description: Updated expat packages that fix two security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Expat is a C library written by James Clark for parsing XML documents. Two buffer over-read flaws were found in the way Expat handled malformed UTF-8 sequences when processing XML files. A specially-crafted XML file could cause applications using Expat to crash while parsing the file. (CVE-2009-3560, CVE-2009-3720) | ||||
Applies to: expat |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29109 |
Title: RHSA-2009:1620 -- bind security update |
Type: Software |
Bulletins:
MITRE:29109 |
Severity: Low |
Description: Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. | ||||
Applies to: bind |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29382 |
Title: RHSA-2009:1619 -- dstat security update |
Type: Software |
Bulletins:
MITRE:29382 |
Severity: Low |
Description: An updated dstat package that fixes one security issue is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Dstat is a versatile replacement for the vmstat, iostat, and netstat tools. Dstat can be used for performance tuning tests, benchmarks, and troubleshooting. | ||||
Applies to: dstat |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29047 |
Title: RHSA-2009:1615 -- xerces-j2 security update |
Type: Software |
Bulletins:
MITRE:29047 |
Severity: Low |
Description: Updated xerces-j2 packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The xerces-j2 packages provide the Apache Xerces2 Java Parser, a high-performance XML parser. A Document Type Definition (DTD) defines the legal syntax (and also which elements can be used) for certain types of files, such as XML files. | ||||
Applies to: xerces-j2 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29365 |
Title: RHSA-2009:1601 -- kdelibs security update |
Type: Miscellaneous |
Bulletins:
MITRE:29365 |
Severity: Low |
Description: Updated kdelibs packages that fix one security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. The kdelibs packages provide libraries for the K Desktop Environment (KDE). A buffer overflow flaw was found in the kdelibs string to floating point conversion routines. A web page containing malicious JavaScript could crash Konqueror or, potentially, execute arbitrary code with the privileges of the user running Konqueror. (CVE-2009-0689) | ||||
Applies to: kdelibs |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28898 |
Title: RHSA-2009:1584 -- java-1.6.0-openjdk security update |
Type: Software |
Bulletins:
MITRE:28898 |
Severity: Low |
Description: Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE) contains the software and tools that users need to run applications written using the Java programming language. | ||||
Applies to: java-1.6.0-openjdk |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29317 |
Title: RHSA-2009:1579 -- httpd security update |
Type: Web |
Bulletins:
MITRE:29317 |
Severity: Low |
Description: Updated httpd packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Apache HTTP Server is a popular Web server. A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure Sockets Layer) protocols handle session renegotiation. A man-in-the-middle attacker could use this flaw to prefix arbitrary plain text to a client's session (for example, an HTTPS connection to a website). This could force the server to process an attacker's request as if authenticated using the victim's credentials. This update partially mitigates this flaw for SSL sessions to HTTP servers using mod_ssl by rejecting client-requested renegotiation. (CVE-2009-3555) | ||||
Applies to: httpd |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29170 |
Title: RHSA-2009:1561 -- libvorbis security update |
Type: Miscellaneous |
Bulletins:
MITRE:29170 |
Severity: Low |
Description: Updated libvorbis packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The libvorbis packages contain runtime libraries for use in programs that support Ogg Vorbis. Ogg Vorbis is a fully open, non-proprietary, patent-and royalty-free, general-purpose compressed audio format. | ||||
Applies to: libvorbis |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29275 |
Title: RHSA-2009:1549 -- wget security update |
Type: Software |
Bulletins:
MITRE:29275 |
Severity: Low |
Description: An updated wget package that fixes a security issue is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GNU Wget is a file retrieval utility that can use HTTP, HTTPS, and FTP. Daniel Stenberg reported that Wget is affected by the previously published null prefix attack, caused by incorrect handling of NULL characters in X.509 certificates. If an attacker is able to get a carefully-crafted certificate signed by a trusted Certificate Authority, the attacker could use the certificate during a man-in-the-middle attack and potentially confuse Wget into accepting it by mistake. (CVE-2009-3490) Wget users should upgrade to this updated package, which contains a backported patch to correct this issue. | ||||
Applies to: wget |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29269 |
Title: RHSA-2009:1548 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:29269 |
Severity: Low |
Description: Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29046 |
Title: RHSA-2009:1536 -- pidgin security update |
Type: Software |
Bulletins:
MITRE:29046 |
Severity: Low |
Description: Updated pidgin packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. The AOL Open System for Communication in Realtime (OSCAR) protocol is used by the AOL ICQ and AIM instant messaging systems. An invalid pointer dereference bug was found in the way the Pidgin OSCAR protocol implementation processed lists of contacts. A remote attacker could send a specially-crafted contact list to a user running Pidgin, causing Pidgin to crash. (CVE-2009-3615) | ||||
Applies to: pidgin |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29230 |
Title: RHSA-2009:1530 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29230 |
Severity: Low |
Description: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. nspr provides the Netscape Portable Runtime (NSPR). A flaw was found in the way Firefox handles form history. A malicious web page could steal saved form data by synthesizing input events, causing the browser to auto-fill form fields (which could then be read by an attacker). (CVE-2009-3370) | ||||
Applies to: firefox nspr xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29264 |
Title: RHSA-2009:1529 -- samba security update |
Type: Services |
Bulletins:
MITRE:29264 |
Severity: Low |
Description: Updated samba packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Samba is a suite of programs used by machines to share files, printers, and other information. A denial of service flaw was found in the Samba smbd daemon. An authenticated, remote user could send a specially-crafted response that would cause an smbd child process to enter an infinite loop. An authenticated, remote user could use this flaw to exhaust system resources by opening multiple CIFS sessions. (CVE-2009-2906) | ||||
Applies to: samba |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29310 |
Title: RHSA-2009:1513 -- cups security update |
Type: Services |
Bulletins:
MITRE:29310 |
Severity: Low |
Description: Updated cups packages that fix two security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. | ||||
Applies to: cups |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28916 |
Title: RHSA-2009:1504 -- poppler security and bug fix update |
Type: Miscellaneous |
Bulletins:
MITRE:28916 |
Severity: Low |
Description: Updated poppler packages that fix multiple security issues and a bug are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. | ||||
Applies to: poppler |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28897 |
Title: RHSA-2009:1502 -- kdegraphics security update |
Type: Miscellaneous |
Bulletins:
MITRE:28897 |
Severity: Low |
Description: Updated kdegraphics packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kdegraphics packages contain applications for the K Desktop Environment, including KPDF, a viewer for Portable Document Format (PDF) files. | ||||
Applies to: kdegraphics |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29190 |
Title: RHSA-2009:1490 -- squirrelmail security update |
Type: Web |
Bulletins:
MITRE:29190 |
Severity: Low |
Description: An updated squirrelmail package that fixes several security issues is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. | ||||
Applies to: squirrelmail |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28941 |
Title: RHSA-2009:1484 -- postgresql security update |
Type: Services |
Bulletins:
MITRE:28941 |
Severity: Low |
Description: Updated postgresql packages that fix two security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. PostgreSQL is an advanced object-relational database management system (DBMS). It was discovered that the upstream patch for CVE-2007-6600 included in the Red Hat Security Advisory RHSA-2008:0038 did not include protection against misuse of the RESET ROLE and RESET SESSION AUTHORIZATION commands. An authenticated user could use this flaw to install malicious code that would later execute with superuser privileges. (CVE-2009-3230) | ||||
Applies to: postgresql |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29340 |
Title: RHSA-2009:1472 -- xen security and bug fix update |
Type: Software |
Bulletins:
MITRE:29340 |
Severity: Low |
Description: Updated xen packages that fix a security issue and multiple bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Xen is an open source virtualization framework. Virtualization allows users to run guest operating systems in virtual machines on top of a host operating system. | ||||
Applies to: xen |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28926 |
Title: RHSA-2009:1471 -- elinks security update |
Type: Web |
Bulletins:
MITRE:28926 |
Severity: Low |
Description: An updated elinks package that fixes two security issues is now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. ELinks is a text-based Web browser. ELinks does not display any images, but it does support frames, tables, and most other HTML tags. An off-by-one buffer overflow flaw was discovered in the way ELinks handled its internal cache of string representations for HTML special entities. A remote attacker could use this flaw to create a specially-crafted HTML file that would cause ELinks to crash or, possibly, execute arbitrary code when rendered. (CVE-2008-7224) | ||||
Applies to: elinks |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29271 |
Title: RHSA-2009:1470 -- openssh security update |
Type: Services |
Bulletins:
MITRE:29271 |
Severity: Low |
Description: Updated openssh packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. | ||||
Applies to: openssh |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29041 |
Title: RHSA-2009:1463 -- newt security update |
Type: Miscellaneous |
Bulletins:
MITRE:29041 |
Severity: Low |
Description: Updated newt packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Newt is a programming library for color text mode, widget-based user interfaces. Newt can be used to add stacked windows, entry widgets, checkboxes, radio buttons, labels, plain text fields, scrollbars, and so on, to text mode user interfaces. | ||||
Applies to: newt |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28758 |
Title: RHSA-2009:1459 -- cyrus-imapd security update |
Type: Software |
Bulletins:
MITRE:28758 |
Severity: Low |
Description: Updated cyrus-imapd packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and Sieve support. | ||||
Applies to: cyrus-imapd |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28765 |
Title: RHSA-2009:1453 -- pidgin security update |
Type: Software |
Bulletins:
MITRE:28765 |
Severity: Low |
Description: Updated pidgin packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. Info/Query (IQ) is an Extensible Messaging and Presence Protocol (XMPP) specific request-response mechanism. A NULL pointer dereference flaw was found in the way the Pidgin XMPP protocol plug-in processes IQ error responses when trying to fetch a custom smiley. A remote client could send a specially-crafted IQ error response that would crash Pidgin. (CVE-2009-3085) | ||||
Applies to: pidgin |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29270 |
Title: RHSA-2009:1452 -- neon security update |
Type: Software |
Bulletins:
MITRE:29270 |
Severity: Low |
Description: Updated neon packages that fix two security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. neon is an HTTP and WebDAV client library, with a C interface. It provides a high-level interface to HTTP and WebDAV methods along with a low-level interface for HTTP request handling. neon supports persistent connections, proxy servers, basic, digest and Kerberos authentication, and has complete SSL support. | ||||
Applies to: neon |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29331 |
Title: RHSA-2009:1451 -- freeradius security update |
Type: Software |
Bulletins:
MITRE:29331 |
Severity: Low |
Description: Updated freeradius packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network. | ||||
Applies to: freeradius |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29334 |
Title: RHSA-2009:1430 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29334 |
Severity: Low |
Description: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. nspr provides the Netscape Portable Runtime (NSPR). | ||||
Applies to: firefox nspr xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29320 |
Title: RHSA-2009:1428 -- xmlsec1 security update |
Type: Software |
Bulletins:
MITRE:29320 |
Severity: Low |
Description: Updated xmlsec1 packages that fix one security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The XML Security Library is a C library based on libxml2 and OpenSSL. It implements the XML Signature Syntax and Processing and XML Encryption Syntax and Processing standards. HMAC is used for message authentication using cryptographic hash functions. The HMAC algorithm allows the hash output to be truncated (as documented in RFC 2104). | ||||
Applies to: xmlsec1 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29379 |
Title: RHSA-2009:1427 -- fetchmail security update |
Type: |
Bulletins:
MITRE:29379 |
Severity: Low |
Description: An updated fetchmail package that fixes multiple security issues is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. | ||||
Applies to: fetchmail |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29111 |
Title: RHSA-2009:1426 -- openoffice.org security update |
Type: Software |
Bulletins:
MITRE:29111 |
Severity: Low |
Description: Updated openoffice.org packages that correct security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenOffice.org is an office productivity suite that includes desktop applications, such as a word processor, spreadsheet, presentation manager, formula editor, and a drawing program. An integer underflow flaw and a boundary error flaw, both possibly leading to a heap-based buffer overflow, were found in the way OpenOffice.org parses certain records in Microsoft Word documents. An attacker could create a specially-crafted Microsoft Word document, which once opened by an unsuspecting user, could cause OpenOffice.org to crash or, potentially, execute arbitrary code with the permissions of the user running OpenOffice.org. (CVE-2009-0200, CVE-2009-0201) All users of OpenOffice.org are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of OpenOffice.org applications must be restarted for this update to take effect. | ||||
Applies to: openoffice.org openoffice.org2 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29259 |
Title: RHSA-2009:1364 -- gdm security and bug fix update |
Type: Software |
Bulletins:
MITRE:29259 |
Severity: Low |
Description: Updated gdm packages that fix a security issue and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. The GNOME Display Manager (GDM) is a configurable re-implementation of XDM, the X Display Manager. GDM allows you to log in to your system with the X Window System running, and supports running several different X sessions on your local machine at the same time. A flaw was found in the way the gdm package was built. The gdm package was missing TCP wrappers support, which could result in an administrator believing they had access restrictions enabled when they did not. (CVE-2009-2697) | ||||
Applies to: gdm |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29052 |
Title: RHSA-2009:1341 -- cman security, bug fix, and enhancement update |
Type: Software |
Bulletins:
MITRE:29052 |
Severity: Low |
Description: Updated cman packages that fix several security issues, various bugs, and add enhancements are now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. The Cluster Manager (cman) utility provides services for managing a Linux cluster. Multiple insecure temporary file use flaws were found in fence_apc_snmp and ccs_tool. A local attacker could use these flaws to overwrite an arbitrary file writable by a victim running those utilities (typically root) with the output of the utilities via a symbolic link attack. (CVE-2008-4579, CVE-2008-6552) | ||||
Applies to: cman |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28953 |
Title: RHSA-2009:1337 -- gfs2-utils security and bug fix update |
Type: Software |
Bulletins:
MITRE:28953 |
Severity: Low |
Description: An updated gfs2-utils package that fixes multiple security issues and various bugs is now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. The gfs2-utils package provides the user-space tools necessary to mount, create, maintain, and test GFS2 file systems. Multiple insecure temporary file use flaws were discovered in GFS2 user level utilities. A local attacker could use these flaws to overwrite an arbitrary file writable by a victim running those utilities (typically root) with the output of the utilities via a symbolic link attack. (CVE-2008-6552) | ||||
Applies to: gfs2-utils |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28749 |
Title: RHSA-2009:1335 -- openssl security, bug fix, and enhancement update |
Type: Web |
Bulletins:
MITRE:28749 |
Severity: Low |
Description: Updated openssl packages that fix several security issues, various bugs, and add enhancements are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength general purpose cryptography library. Datagram TLS (DTLS) is a protocol based on TLS that is capable of securing datagram transport (for example, UDP). | ||||
Applies to: openssl |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29369 |
Title: RHSA-2009:1321 -- nfs-utils security and bug fix update |
Type: Miscellaneous |
Bulletins:
MITRE:29369 |
Severity: Low |
Description: An updated nfs-utils package that fixes a security issue and several bugs is now available. This update has been rated as having low security impact by the Red Hat Security Response Team. The nfs-utils package provides a daemon for the kernel NFS server and related tools. | ||||
Applies to: nfs-utils |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29358 |
Title: RHSA-2009:1307 -- ecryptfs-utils security, bug fix, and enhancement update |
Type: Software |
Bulletins:
MITRE:29358 |
Severity: Low |
Description: Updated ecryptfs-utils packages that fix a security issue, various bugs, and add enhancements are now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. eCryptfs is a stacked, cryptographic file system. It is transparent to the underlying file system and provides per-file granularity. | ||||
Applies to: ecryptfs-utils |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28888 |
Title: RHSA-2009:1289 -- mysql security and bug fix update |
Type: Software |
Bulletins:
MITRE:28888 |
Severity: Low |
Description: Updated mysql packages that fix various security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. | ||||
Applies to: mysql |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29350 |
Title: RHSA-2009:1287 -- openssh security, bug fix, and enhancement update |
Type: Services |
Bulletins:
MITRE:29350 |
Severity: Low |
Description: Updated openssh packages that fix a security issue, a bug, and add enhancements are now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. | ||||
Applies to: openssh |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28929 |
Title: RHSA-2009:1278 -- lftp security and bug fix update |
Type: Software |
Bulletins:
MITRE:28929 |
Severity: Low |
Description: An updated lftp package that fixes one security issue and various bugs is now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. LFTP is a sophisticated file transfer program for the FTP and HTTP protocols. Like bash, it has job control and uses the readline library for input. It has bookmarks, built-in mirroring, and can transfer several files in parallel. It is designed with reliability in mind. | ||||
Applies to: lftp |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29153 |
Title: RHSA-2009:1243 -- Red Hat Enterprise Linux 5.4 kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:29153 |
Severity: Low |
Description: Updated kernel packages that fix security issues, address several hundred bugs and add numerous enhancements are now available as part of the ongoing support and maintenance of Red Hat Enterprise Linux version 5. This is the fourth regular update. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29359 |
Title: RHSA-2009:1238 -- dnsmasq security update |
Type: DNS |
Bulletins:
MITRE:29359 |
Severity: Low |
Description: An updated dnsmasq package that fixes two security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Dnsmasq is a lightweight and easy to configure DNS forwarder and DHCP server. | ||||
Applies to: dnsmasq |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29281 |
Title: RHSA-2009:1232 -- gnutls security update |
Type: Software |
Bulletins:
MITRE:29281 |
Severity: Low |
Description: Updated gnutls packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security (TLS). | ||||
Applies to: gnutls |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28627 |
Title: RHSA-2009:1222 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:28627 |
Severity: Low |
Description: Updated kernel packages that fix two security issues and a bug are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29217 |
Title: RHSA-2009:1219 -- libvorbis security update |
Type: Miscellaneous |
Bulletins:
MITRE:29217 |
Severity: Low |
Description: Updated libvorbis packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The libvorbis packages contain runtime libraries for use in programs that support Ogg Vorbis. Ogg Vorbis is a fully open, non-proprietary, patent-and royalty-free, general-purpose compressed audio format. | ||||
Applies to: libvorbis |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29222 |
Title: RHSA-2009:1218 -- pidgin security update |
Type: Software |
Bulletins:
MITRE:29222 |
Severity: Low |
Description: Updated pidgin packages that fix a security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. Federico Muttis of Core Security Technologies discovered a flaw in Pidgin's MSN protocol handler. If a user received a malicious MSN message, it was possible to execute arbitrary code with the permissions of the user running Pidgin. (CVE-2009-2694) | ||||
Applies to: pidgin |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29134 |
Title: RHSA-2009:1209 -- curl security update |
Type: Web |
Bulletins:
MITRE:29134 |
Severity: Low |
Description: Updated curl packages that fix security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and Dict servers, using any of the supported protocols. cURL is designed to work without user interaction or any kind of interactivity. | ||||
Applies to: curl |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28958 |
Title: RHSA-2009:1206 -- libxml and libxml2 security update |
Type: Miscellaneous |
Bulletins:
MITRE:28958 |
Severity: Low |
Description: Updated libxml and libxml2 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. libxml is a library for parsing and manipulating XML files. A Document Type Definition (DTD) defines the legal syntax (and also which elements can be used) for certain types of files, such as XML files. | ||||
Applies to: libxml libxml2 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29077 |
Title: RHSA-2009:1204 -- apr and apr-util security update |
Type: Web |
Bulletins:
MITRE:29077 |
Severity: Low |
Description: Updated apr and apr-util packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It aims to provide a free library of C data structures and routines. | ||||
Applies to: apr apr-util |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29163 |
Title: RHSA-2009:1203 -- subversion security update |
Type: Services |
Bulletins:
MITRE:29163 |
Severity: Low |
Description: Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. | ||||
Applies to: subversion |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29205 |
Title: RHSA-2009:1201 -- java-1.6.0-openjdk security and bug fix update |
Type: Software |
Bulletins:
MITRE:29205 |
Severity: Low |
Description: Updated java-1.6.0-openjdk packages that fix several security issues and a bug are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE) contains the software and tools that users need to run applications written using the Java programming language. | ||||
Applies to: java-1.6.0-openjdk |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29154 |
Title: RHSA-2009:1193 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:29154 |
Severity: Low |
Description: Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29169 |
Title: RHSA-2009:1186 -- nspr and nss security, bug fix, and enhancement update |
Type: Web |
Bulletins:
MITRE:29169 |
Severity: Low |
Description: Updated nspr and nss packages that fix security issues, bugs, and add an enhancement are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. | ||||
Applies to: nspr nss |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28629 |
Title: RHSA-2009:1179 -- bind security update |
Type: Software |
Bulletins:
MITRE:28629 |
Severity: Low |
Description: Updated bind packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. [Updated 29th July 2009] The packages in this erratum have been updated to also correct this issue in the bind-sdb package. | ||||
Applies to: bind |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29294 |
Title: RHSA-2009:1176 -- python security update |
Type: Software |
Bulletins:
MITRE:29294 |
Severity: Low |
Description: Updated python packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Python is an interpreted, interactive, object-oriented programming language. | ||||
Applies to: python |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29179 |
Title: RHSA-2009:1164 -- tomcat security update |
Type: Web |
Bulletins:
MITRE:29179 |
Severity: Low |
Description: Updated tomcat packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. | ||||
Applies to: tomcat5 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29188 |
Title: RHSA-2009:1162 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29188 |
Severity: Low |
Description: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. | ||||
Applies to: firefox xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28879 |
Title: RHSA-2009:1159 -- libtiff security update |
Type: Miscellaneous |
Bulletins:
MITRE:28879 |
Severity: Low |
Description: Updated libtiff packages that fix several security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. | ||||
Applies to: libtiff |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28396 |
Title: RHSA-2009:1148 -- httpd security update |
Type: Web |
Bulletins:
MITRE:28396 |
Severity: Low |
Description: Updated httpd packages that fix two security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Apache HTTP Server is a popular Web server. A denial of service flaw was found in the Apache mod_proxy module when it was used as a reverse proxy. A remote attacker could use this flaw to force a proxy process to consume large amounts of CPU time. (CVE-2009-1890) | ||||
Applies to: httpd |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29258 |
Title: RHSA-2009:1140 -- ruby security update |
Type: Software |
Bulletins:
MITRE:29258 |
Severity: Low |
Description: Updated ruby packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. | ||||
Applies to: ruby |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29100 |
Title: RHSA-2009:1139 -- pidgin security and bug fix update |
Type: Software |
Bulletins:
MITRE:29100 |
Severity: Low |
Description: Updated pidgin packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. The AOL Open System for CommunicAtion in Realtime (OSCAR) protocol is used by the AOL ICQ and AIM instant messaging systems. | ||||
Applies to: pidgin |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29103 |
Title: RHSA-2009:1138 -- openswan security update |
Type: Miscellaneous |
Bulletins:
MITRE:29103 |
Severity: Low |
Description: Updated openswan packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Openswan is a free implementation of Internet Protocol Security (IPsec) and Internet Key Exchange (IKE). IPsec uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. Everything passing through the untrusted network is encrypted by the IPsec gateway machine, and decrypted by the gateway at the other end of the tunnel. The resulting tunnel is a virtual private network (VPN). | ||||
Applies to: openswan |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29125 |
Title: RHSA-2009:1130 -- kdegraphics security update |
Type: Miscellaneous |
Bulletins:
MITRE:29125 |
Severity: Low |
Description: Updated kdegraphics packages that fix two security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. The kdegraphics packages contain applications for the K Desktop Environment (KDE). Scalable Vector Graphics (SVG) is an XML-based language to describe vector images. KSVG is a framework aimed at implementing the latest W3C SVG specifications. | ||||
Applies to: kdegraphics |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29301 |
Title: RHSA-2009:1127 -- kdelibs security update |
Type: Miscellaneous |
Bulletins:
MITRE:29301 |
Severity: Low |
Description: Updated kdelibs packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. The kdelibs packages provide libraries for the K Desktop Environment (KDE). | ||||
Applies to: kdelibs |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29183 |
Title: RHSA-2009:1126 -- thunderbird security update |
Type: Software |
Bulletins:
MITRE:29183 |
Severity: Low |
Description: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2009-1392, CVE-2009-1303, CVE-2009-1305, CVE-2009-1833, CVE-2009-1838) | ||||
Applies to: thunderbird |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29311 |
Title: RHSA-2009:1123 -- gstreamer-plugins-good security update |
Type: Software |
Bulletins:
MITRE:29311 |
Severity: Low |
Description: Updated gstreamer-plugins-good packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GStreamer is a streaming media framework, based on graphs of filters which operate on media data. GStreamer Good Plug-ins is a collection of well-supported, good quality GStreamer plug-ins. Multiple integer overflow flaws, that could lead to a buffer overflow, were found in the GStreamer Good Plug-ins PNG decoding handler. An attacker could create a specially-crafted PNG file that would cause an application using the GStreamer Good Plug-ins library to crash or, potentially, execute arbitrary code as the user running the application when parsed. (CVE-2009-1932) | ||||
Applies to: gstreamer-plugins-good |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28965 |
Title: RHSA-2009:1122 -- icu security update |
Type: Miscellaneous |
Bulletins:
MITRE:28965 |
Severity: Low |
Description: Updated icu packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. A flaw was found in the way ICU processed certain, invalid byte sequences during Unicode conversion. If an application used ICU to decode malformed, multibyte character data, it may have been possible to bypass certain content protection mechanisms, or display information in a manner misleading to the user. (CVE-2009-0153) All users of icu should upgrade to these updated packages, which contain backported patches to resolve this issue. | ||||
Applies to: icu |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29022 |
Title: RHSA-2009:1116 -- cyrus-imapd security update |
Type: Software |
Bulletins:
MITRE:29022 |
Severity: Low |
Description: Updated cyrus-imapd packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support. | ||||
Applies to: cyrus-imapd |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29299 |
Title: RHSA-2009:1107 -- apr-util security update |
Type: Web |
Bulletins:
MITRE:29299 |
Severity: Low |
Description: Updated apr-util packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. apr-util is a utility library used with the Apache Portable Runtime (APR). It aims to provide a free library of C data structures and routines. This library contains additional utility interfaces for APR; including support for XML, LDAP, database interfaces, URI parsing, and more. | ||||
Applies to: apr-util |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28617 |
Title: RHSA-2009:1106 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:28617 |
Severity: Low |
Description: Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29254 |
Title: RHSA-2009:1102 -- cscope security update |
Type: Software |
Bulletins:
MITRE:29254 |
Severity: Low |
Description: An updated cscope package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. cscope is a mature, ncurses-based, C source-code tree browsing tool. Multiple buffer overflow flaws were found in cscope. An attacker could create a specially crafted source code file that could cause cscope to crash or, possibly, execute arbitrary code when browsed with cscope. (CVE-2004-2541, CVE-2009-0148) All users of cscope are advised to upgrade to this updated package, which contains backported patches to fix these issues. All running instances of cscope must be restarted for this update to take effect. | ||||
Applies to: cscope |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28894 |
Title: RHSA-2009:1100 -- wireshark security update |
Type: Software |
Bulletins:
MITRE:28894 |
Severity: Low |
Description: Updated wireshark packages that fix several security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. A format string flaw was found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2009-1210) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2009-1268, CVE-2009-1269, CVE-2009-1829) Users of wireshark should upgrade to these updated packages, which contain Wireshark version 1.0.8, and resolve these issues. All running instances of Wireshark must be restarted for the update to take effect. | ||||
Applies to: wireshark |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29396 |
Title: RHSA-2009:1095 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29396 |
Severity: Low |
Description: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1837, CVE-2009-1838, CVE-2009-1841) | ||||
Applies to: firefox xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29206 |
Title: RHSA-2009:1082 -- cups security update |
Type: Services |
Bulletins:
MITRE:29206 |
Severity: Low |
Description: Updated cups packages that fix one security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX reg; Printing System (CUPS) provides a portable printing layer for UNIX operating systems. The Internet Printing Protocol (IPP) allows users to print and manage printing-related tasks over a network. A NULL pointer dereference flaw was found in the CUPS IPP routine, used for processing incoming IPP requests for the CUPS scheduler. An attacker could use this flaw to send specially-crafted IPP requests that would crash the cupsd daemon. (CVE-2009-0949) | ||||
Applies to: cups |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28800 |
Title: RHSA-2009:1075 -- httpd security update |
Type: Web |
Bulletins:
MITRE:28800 |
Severity: Low |
Description: Updated httpd packages that fix two security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Apache HTTP Server is a popular and freely-available Web server. A flaw was found in the handling of compression structures between mod_ssl and OpenSSL. If too many connections were opened in a short period of time, all system memory and swap space would be consumed by httpd, negatively impacting other processes, or causing a system crash. (CVE-2008-1678) | ||||
Applies to: httpd |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29339 |
Title: RHSA-2009:1066 -- squirrelmail security update |
Type: Web |
Bulletins:
MITRE:29339 |
Severity: Low |
Description: An updated squirrelmail package that fixes multiple security issues is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. SquirrelMail is a standards-based webmail package written in PHP. | ||||
Applies to: squirrelmail |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29091 |
Title: RHSA-2009:1061 -- freetype security update |
Type: Miscellaneous |
Bulletins:
MITRE:29091 |
Severity: Low |
Description: Updated freetype packages that fix various security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. FreeType is a free, high-quality, portable font engine that can open and manage font files. It also loads, hints, and renders individual glyphs efficiently. These packages provide the FreeType 2 font engine. | ||||
Applies to: freetype |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29110 |
Title: RHSA-2009:1060 -- pidgin security update |
Type: Software |
Bulletins:
MITRE:29110 |
Severity: Low |
Description: Updated pidgin packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. A buffer overflow flaw was found in the way Pidgin initiates file transfers when using the Extensible Messaging and Presence Protocol (XMPP). If a Pidgin client initiates a file transfer, and the remote target sends a malformed response, it could cause Pidgin to crash or, potentially, execute arbitrary code with the permissions of the user running Pidgin. This flaw only affects accounts using XMPP, such as Jabber and Google Talk. (CVE-2009-1373) | ||||
Applies to: pidgin |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29463 |
Title: RHSA-2009:1039 -- ntp security update |
Type: Miscellaneous |
Bulletins:
MITRE:29463 |
Severity: Low |
Description: An updated ntp package that fixes two security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. | ||||
Applies to: ntp |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28495 |
Title: RHSA-2009:1036 -- ipsec-tools security update |
Type: Miscellaneous |
Bulletins:
MITRE:28495 |
Severity: Low |
Description: An updated ipsec-tools package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The ipsec-tools package is used in conjunction with the IPsec functionality in the Linux kernel and includes racoon, an IKEv1 keying daemon. A denial of service flaw was found in the ipsec-tools racoon daemon. An unauthenticated, remote attacker could trigger a NULL pointer dereference that could cause the racoon daemon to crash. (CVE-2009-1574) | ||||
Applies to: ipsec-tools |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28869 |
Title: RHSA-2009:0480 -- poppler security update |
Type: Miscellaneous |
Bulletins:
MITRE:28869 |
Severity: Low |
Description: Updated poppler packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Multiple integer overflow flaws were found in poppler. An attacker could create a malicious PDF file that would cause applications that use poppler (such as Evince) to crash or, potentially, execute arbitrary code when opened. (CVE-2009-0147, CVE-2009-1179, CVE-2009-1187, CVE-2009-1188) | ||||
Applies to: poppler |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29079 |
Title: RHSA-2009:0479 -- perl-DBD-Pg security update |
Type: Software |
Bulletins:
MITRE:29079 |
Severity: Low |
Description: An updated perl-DBD-Pg package that fixes two security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Perl DBI is a database access Application Programming Interface (API) for the Perl language. perl-DBD-Pg allows Perl applications to access PostgreSQL database servers. A heap-based buffer overflow flaw was discovered in the pg_getline function implementation. If the pg_getline or getline functions read large, untrusted records from a database, it could cause an application using these functions to crash or, possibly, execute arbitrary code. (CVE-2009-0663) | ||||
Applies to: perl-DBD-Pg |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28946 |
Title: RHSA-2009:0476 -- pango security update |
Type: Software |
Bulletins:
MITRE:28946 |
Severity: Low |
Description: Updated pango and evolution28-pango packages that fix an integer overflow flaw are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Pango is a library used for the layout and rendering of internationalized text. | ||||
Applies to: evolution28-pango pango |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28838 |
Title: RHSA-2009:0474 -- acpid security update |
Type: Services |
Bulletins:
MITRE:28838 |
Severity: Low |
Description: An updated acpid package that fixes one security issue is now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. acpid is a daemon that dispatches ACPI (Advanced Configuration and Power Interface) events to user-space programs. | ||||
Applies to: acpid |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29446 |
Title: RHSA-2009:0473 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:29446 |
Severity: Low |
Description: Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29380 |
Title: RHSA-2009:0457 -- libwmf security update |
Type: Miscellaneous |
Bulletins:
MITRE:29380 |
Severity: Low |
Description: Updated libwmf packages that fix one security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. libwmf is a library for reading and converting Windows Metafile Format (WMF) vector graphics. libwmf is used by applications such as GIMP and ImageMagick. | ||||
Applies to: libwmf |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28736 |
Title: RHSA-2009:0449 -- firefox security update |
Type: Software |
Bulletins:
MITRE:28736 |
Severity: Low |
Description: Updated firefox packages that fix one security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1313) | ||||
Applies to: firefox xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29286 |
Title: RHSA-2009:0444 -- giflib security update |
Type: Software |
Bulletins:
MITRE:29286 |
Severity: Low |
Description: Updated giflib packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The giflib packages contain a shared library of functions for loading and saving GIF image files. This library is API and ABI compatible with libungif, the library that supported uncompressed GIF image files while the Unisys LZW patent was in effect. Several flaws were discovered in the way giflib decodes GIF images. An attacker could create a carefully crafted GIF image that could cause an application using giflib to crash or, possibly, execute arbitrary code when opened by a victim. (CVE-2005-2974, CVE-2005-3350) | ||||
Applies to: giflib |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29267 |
Title: RHSA-2009:0436 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29267 |
Severity: Low |
Description: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1302, CVE-2009-1303, CVE-2009-1304, CVE-2009-1305) | ||||
Applies to: firefox xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29193 |
Title: RHSA-2009:0431 -- kdegraphics security update |
Type: Miscellaneous |
Bulletins:
MITRE:29193 |
Severity: Low |
Description: Updated kdegraphics packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kdegraphics packages contain applications for the K Desktop Environment, including KPDF, a viewer for Portable Document Format (PDF) files. Multiple integer overflow flaws were found in KPDF's JBIG2 decoder. An attacker could create a malicious PDF file that would cause KPDF to crash or, potentially, execute arbitrary code when opened. (CVE-2009-0147, CVE-2009-1179) | ||||
Applies to: kdegraphics |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28592 |
Title: RHSA-2009:0429 -- cups security update |
Type: Services |
Bulletins:
MITRE:28592 |
Severity: Low |
Description: Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. | ||||
Applies to: cups |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28703 |
Title: RHSA-2009:0427 -- udev security update |
Type: Services |
Bulletins:
MITRE:28703 |
Severity: Low |
Description: Updated udev packages that fix one security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. udev provides a user-space API and implements a dynamic device directory, providing only the devices present on the system. udev replaces devfs in order to provide greater hot plug functionality. Netlink is a datagram oriented service, used to transfer information between kernel modules and user-space processes. It was discovered that udev did not properly check the origin of Netlink messages. A local attacker could use this flaw to gain root privileges via a crafted Netlink message sent to udev, causing it to create a world-writable block device file for an existing system block device (for example, the root file system). (CVE-2009-1185) | ||||
Applies to: udev |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29276 |
Title: RHSA-2009:0421 -- ghostscript security update |
Type: Miscellaneous |
Bulletins:
MITRE:29276 |
Severity: Low |
Description: Updated ghostscript packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ghostscript is a set of software that provides a PostScript interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. | ||||
Applies to: ghostscript |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29387 |
Title: RHSA-2009:0411 -- device-mapper-multipath security update |
Type: Software |
Bulletins:
MITRE:29387 |
Severity: Low |
Description: Updated device-mapper-multipath packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The device-mapper multipath packages provide tools to manage multipath devices by issuing instructions to the device-mapper multipath kernel module, and by managing the creation and removal of partitions for device-mapper devices. | ||||
Applies to: device-mapper-multipath |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28421 |
Title: RHSA-2009:0408 -- krb5 security update |
Type: Services |
Bulletins:
MITRE:28421 |
Severity: Low |
Description: Updated krb5 packages that fix various security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third party, the Key Distribution Center (KDC). The Generic Security Service Application Program Interface (GSS-API) definition provides security services to callers (protocols) in a generic fashion. The Simple and Protected GSS-API Negotiation (SPNEGO) mechanism is used by GSS-API peers to choose from a common set of security mechanisms. An input validation flaw was found in the ASN.1 (Abstract Syntax Notation One) decoder used by MIT Kerberos. A remote attacker could use this flaw to crash a network service using the MIT Kerberos library, such as kadmind or krb5kdc, by causing it to dereference or free an uninitialized pointer. (CVE-2009-0846) | ||||
Applies to: krb5 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28934 |
Title: RHSA-2009:0402 -- openswan security update |
Type: Miscellaneous |
Bulletins:
MITRE:28934 |
Severity: Low |
Description: Updated openswan packages that fix various security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Openswan is a free implementation of Internet Protocol Security (IPsec) and Internet Key Exchange (IKE). IPsec uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. Everything passing through the untrusted network is encrypted by the IPsec gateway machine, and decrypted by the gateway at the other end of the tunnel. The resulting tunnel is a virtual private network (VPN). | ||||
Applies to: openswan |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29178 |
Title: RHSA-2009:0397 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29178 |
Severity: Low |
Description: Updated firefox packages that fix two security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. A memory corruption flaw was discovered in the way Firefox handles XML files containing an XSLT transform. A remote attacker could use this flaw to crash Firefox or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1169) | ||||
Applies to: firefox xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29277 |
Title: RHSA-2009:0377 -- java-1.6.0-openjdk security update |
Type: Software |
Bulletins:
MITRE:29277 |
Severity: Low |
Description: Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE) contains the software and tools that users need to run applications written using the Java programming language. | ||||
Applies to: java-1.6.0-openjdk |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28954 |
Title: RHSA-2009:0373 -- systemtap security update |
Type: Miscellaneous |
Bulletins:
MITRE:28954 |
Severity: Low |
Description: Updated systemtap packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. SystemTap is an instrumentation infrastructure for systems running version 2.6 of the Linux kernel. SystemTap scripts can collect system operations data, greatly simplifying information gathering. Collected data can then assist in performance measuring, functional testing, and performance and function problem diagnosis. | ||||
Applies to: systemtap |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29262 |
Title: RHSA-2009:0361 -- NetworkManager security update |
Type: Software |
Bulletins:
MITRE:29262 |
Severity: Low |
Description: Updated NetworkManager packages that fix two security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. NetworkManager is a network link manager that attempts to keep a wired or wireless network connection active at all times. An information disclosure flaw was found in NetworkManager's D-Bus interface. A local attacker could leverage this flaw to discover sensitive information, such as network connection passwords and pre-shared keys. (CVE-2009-0365) | ||||
Applies to: NetworkManager |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28741 |
Title: RHSA-2009:0354 -- evolution-data-server security update |
Type: Software |
Bulletins:
MITRE:28741 |
Severity: Low |
Description: Updated evolution-data-server and evolution28-evolution-data-server packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Evolution Data Server provides a unified back-end for applications which interact with contacts, task, and calendar information. Evolution Data Server was originally developed as a back-end for Evolution, but is now used by multiple other applications. | ||||
Applies to: evolution-data-server evolution28-evolution-data-server |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29319 |
Title: RHSA-2009:0352 -- gstreamer-plugins-base security update |
Type: Software |
Bulletins:
MITRE:29319 |
Severity: Low |
Description: Updated gstreamer-plugins-base packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GStreamer is a streaming media framework based on graphs of filters which operate on media data. GStreamer Base Plug-ins is a collection of well-maintained base plug-ins. An integer overflow flaw which caused a heap-based buffer overflow was discovered in the Vorbis comment tags reader. An attacker could create a carefully-crafted Vorbis file that would cause an application using GStreamer to crash or, potentially, execute arbitrary code if opened by a victim. (CVE-2009-0586) | ||||
Applies to: gstreamer-plugins-base |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29171 |
Title: RHSA-2009:0345 -- ghostscript security update |
Type: Miscellaneous |
Bulletins:
MITRE:29171 |
Severity: Low |
Description: Updated ghostscript packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ghostscript is a set of software that provides a PostScript(TM) interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in Ghostscript's International Color Consortium Format library (icclib). Using specially-crafted ICC profiles, an attacker could create a malicious PostScript or PDF file with embedded images which could cause Ghostscript to crash, or, potentially, execute arbitrary code when opened by the victim. (CVE-2009-0583, CVE-2009-0584) All users of ghostscript are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. | ||||
Applies to: ghostscript |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29371 |
Title: RHSA-2009:0344 -- libsoup security update |
Type: Software |
Bulletins:
MITRE:29371 |
Severity: Low |
Description: Updated libsoup and evolution28-libsoup packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. libsoup is an HTTP client/library implementation for GNOME written in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. | ||||
Applies to: evolution28-libsoup libsoup |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28978 |
Title: RHSA-2009:0341 -- curl security update |
Type: Web |
Bulletins:
MITRE:28978 |
Severity: Low |
Description: Updated curl packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and Dict servers, using any of the supported protocols. cURL is designed to work without user interaction or any kind of interactivity. | ||||
Applies to: curl |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29236 |
Title: RHSA-2009:0339 -- lcms security update |
Type: Miscellaneous |
Bulletins:
MITRE:29236 |
Severity: Low |
Description: Updated lcms packages that resolve several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Little Color Management System (LittleCMS) is a small-footprint, speed-optimized open source color management engine. Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in LittleCMS. An attacker could use these flaws to create a specially-crafted image file which could cause an application using LittleCMS to crash, or, possibly, execute arbitrary code when opened by a victim. (CVE-2009-0723, CVE-2009-0733) | ||||
Applies to: lcms |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29345 |
Title: RHSA-2009:0338 -- php security update |
Type: Web |
Bulletins:
MITRE:29345 |
Severity: Low |
Description: Updated php packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server. | ||||
Applies to: php |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29068 |
Title: RHSA-2009:0336 -- glib2 security update |
Type: Software |
Bulletins:
MITRE:29068 |
Severity: Low |
Description: Updated glib2 packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GLib is the low-level core library that forms the basis for projects such as GTK+ and GNOME. It provides data structure handling for C, portability wrappers, and interfaces for such runtime functionality as an event loop, threads, dynamic loading, and an object system. | ||||
Applies to: glib2 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29196 |
Title: RHSA-2009:0333 -- libpng security update |
Type: Miscellaneous |
Bulletins:
MITRE:29196 |
Severity: Low |
Description: Updated libpng and libpng10 packages that fix a couple of security issues are now available for Red Hat Enterprise Linux 2.1, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A flaw was discovered in libpng that could result in libpng trying to freerandom memory if certain, unlikely error conditions occurred. If a carefully-crafted PNG file was loaded by an application linked against libpng, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2009-0040) | ||||
Applies to: libpng libpng10 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28793 |
Title: RHSA-2009:0326 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:28793 |
Severity: Low |
Description: Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29381 |
Title: RHSA-2009:0315 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29381 |
Severity: Low |
Description: An updated firefox package that fixes various security issues is now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-0040, CVE-2009-0771, CVE-2009-0772, CVE-2009-0773, CVE-2009-0774, CVE-2009-0775) | ||||
Applies to: firefox xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29088 |
Title: RHSA-2009:0313 -- wireshark security update |
Type: Software |
Bulletins:
MITRE:29088 |
Severity: Low |
Description: Updated wireshark packages that fix several security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. Multiple buffer overflow flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malformed dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2008-4683, CVE-2009-0599) | ||||
Applies to: wireshark |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29195 |
Title: RHSA-2009:0296 -- icu security update |
Type: Miscellaneous |
Bulletins:
MITRE:29195 |
Severity: Low |
Description: Updated icu packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. A flaw was found in the way ICU processed certain, invalid, encoded data. If an application used ICU to decode malformed, multibyte, character data, it may have been possible to bypass certain content protection mechanisms, or display information in a manner misleading to the user. (CVE-2008-1036) All users of icu should upgrade to these updated packages, which contain backported patches to resolve these issues. | ||||
Applies to: icu |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28896 |
Title: RHSA-2009:0271 -- gstreamer-plugins-good security update |
Type: Software |
Bulletins:
MITRE:28896 |
Severity: Low |
Description: Updated gstreamer-plugins-good packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. GStreamer is a streaming media framework, based on graphs of filters which operate on media data. GStreamer Good Plug-ins is a collection of well-supported, GStreamer plug-ins of good quality released under the LGPL license. | ||||
Applies to: gstreamer-plugins-good |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29098 |
Title: RHSA-2009:0267 -- sudo security update |
Type: Software |
Bulletins:
MITRE:29098 |
Severity: Low |
Description: An updated sudo package to fix a security issue is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The sudo (superuser do) utility allows system administrators to give certain users the ability to run commands as root with logging. | ||||
Applies to: sudo |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28966 |
Title: RHSA-2009:0264 -- kernel security update |
Type: Software |
Bulletins:
MITRE:28966 |
Severity: Low |
Description: Updated kernel packages that resolve several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29367 |
Title: RHSA-2009:0261 -- vnc security update |
Type: Software |
Bulletins:
MITRE:29367 |
Severity: Low |
Description: Updated vnc packages to correct a security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. | ||||
Applies to: vnc |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28850 |
Title: RHSA-2009:0259 -- mod_auth_mysql security update |
Type: Software |
Bulletins:
MITRE:28850 |
Severity: Low |
Description: An updated mod_auth_mysql package to correct a security issue is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The mod_auth_mysql package includes an extension module for the Apache HTTP Server which can be used to implement web user authentication against a MySQL database. | ||||
Applies to: mod_auth_mysql |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29166 |
Title: RHSA-2009:0258 -- thunderbird security update |
Type: Software |
Bulletins:
MITRE:29166 |
Severity: Low |
Description: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2009-0352, CVE-2009-0353, CVE-2009-0772, CVE-2009-0774, CVE-2009-0775) | ||||
Applies to: thunderbird |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29045 |
Title: RHSA-2009:0256 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29045 |
Severity: Low |
Description: All Firefox users should upgrade to these updated packages, which contain Firefox version 3.0.6, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect. | ||||
Applies to: firefox nss xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29343 |
Title: RHSA-2009:0225 -- Red Hat Enterprise Linux 5.3 kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:29343 |
Severity: Low |
Description: Updated kernel packages that fix three security issues, address several hundred bugs and add numerous enhancements are now available as part of the ongoing support and maintenance of Red Hat Enterprise Linux version 5. This is the third regular update. This update has been rated as having important security impact by the Red Hat Security Response Team. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29313 |
Title: RHSA-2009:0205 -- dovecot security and bug fix update |
Type: |
Bulletins:
MITRE:29313 |
Severity: Low |
Description: An updated dovecot package that corrects two security flaws and various bugs is now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. Dovecot is an IMAP server for Linux and UNIX-like systems, primarily written with security in mind. | ||||
Applies to: dovecot |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29213 |
Title: RHSA-2009:0057 -- squirrelmail security update |
Type: Web |
Bulletins:
MITRE:29213 |
Severity: Low |
Description: An updated squirrelmail package that fixes a security issue is now available for Red Hat Enterprise Linux 3, 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. SquirrelMail is an easy-to-configure, standards-based, webmail package written in PHP. It includes built-in PHP support for the IMAP and SMTP protocols, and pure HTML 4.0 page-rendering (with no JavaScript required) for maximum browser-compatibility, strong MIME support, address books, and folder manipulation. | ||||
Applies to: squirrelmail |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28923 |
Title: RHSA-2009:0046 -- ntp security update |
Type: Miscellaneous |
Bulletins:
MITRE:28923 |
Severity: Low |
Description: Updated ntp packages to correct a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source. A flaw was discovered in the way the ntpd daemon checked the return value of the OpenSSL EVP_VerifyFinal function. On systems using NTPv4 authentication, this could lead to an incorrect verification of cryptographic signatures, allowing time-spoofing attacks. (CVE-2009-0021) | ||||
Applies to: ntp |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28987 |
Title: RHSA-2009:0020 -- bind security update |
Type: Software |
Bulletins:
MITRE:28987 |
Severity: Low |
Description: Updated Bind packages to correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025) | ||||
Applies to: bind |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29143 |
Title: RHSA-2009:0018 -- xterm security update |
Type: Software |
Bulletins:
MITRE:29143 |
Severity: Low |
Description: An updated xterm package to correct a security issue is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The xterm program is a terminal emulator for the X Window System. A flaw was found in the xterm handling of Device Control Request Status String (DECRQSS) escape sequences. An attacker could create a malicious text file (or log entry, if unfiltered) that could run arbitrary commands if read by a victim inside an xterm window. (CVE-2008-2383) | ||||
Applies to: xterm |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29261 |
Title: RHSA-2009:0013 -- avahi security update |
Type: DNS |
Bulletins:
MITRE:29261 |
Severity: Low |
Description: Updated avahi packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zeroconf Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, see printers to print to, and find shared files on other computers. Hugo Dias discovered a denial of service flaw in avahi-daemon. A remote attacker on the same local area network (LAN) could send a specially-crafted mDNS (Multicast DNS) packet that would cause avahi-daemon to exit unexpectedly due to a failed assertion check. (CVE-2008-5081) All users are advised to upgrade to these updated packages, which contain a backported patch which resolves this issue. After installing the update, avahi-daemon will be restarted automatically. | ||||
Applies to: avahi |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29253 |
Title: RHSA-2009:0012 -- netpbm security update |
Type: Software |
Bulletins:
MITRE:29253 |
Severity: Low |
Description: Updated netpbm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The netpbm package contains a library of functions for editing and converting between various graphics file formats, including .pbm (portable bitmaps), .pgm (portable graymaps), .pnm (portable anymaps), .ppm (portable pixmaps), and others. | ||||
Applies to: netpbm |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29300 |
Title: RHSA-2009:0011 -- lcms security update |
Type: Miscellaneous |
Bulletins:
MITRE:29300 |
Severity: Low |
Description: Updated lcms packages that resolve several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. | ||||
Applies to: lcms |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29372 |
Title: RHSA-2009:0010 -- squirrelmail security update |
Type: Web |
Bulletins:
MITRE:29372 |
Severity: Low |
Description: An updated squirrelmail package that resolves various security issues is now available for Red Hat Enterprise Linux 3, 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. SquirrelMail is an easy-to-configure, standards-based, webmail package written in PHP. It includes built-in PHP support for the IMAP and SMTP protocols, and pure HTML 4.0 page-rendering (with no JavaScript required) for maximum browser-compatibility, strong MIME support, address books, and folder manipulation. | ||||
Applies to: squirrelmail |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29288 |
Title: RHSA-2009:0008 -- dbus security update |
Type: Miscellaneous |
Bulletins:
MITRE:29288 |
Severity: Low |
Description: Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. A denial-of-service flaw was discovered in the system for sending messages between applications. A local user could send a message with a malformed signature to the bus causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2008-3834) | ||||
Applies to: dbus |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28712 |
Title: RHSA-2009:0004 -- openssl security update |
Type: Web |
Bulletins:
MITRE:28712 |
Severity: Low |
Description: Updated OpenSSL packages that correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength, general purpose, cryptography library. The Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a man in the middle attack, could present a malformed SSL/TLS signature from a certificate chain to a vulnerable client and bypass validation. (CVE-2008-5077) | ||||
Applies to: openssl openssl095a openssl096 openssl096b openssl097a |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28776 |
Title: RHSA-2009:0003 -- xen security and bug fix update |
Type: Software |
Bulletins:
MITRE:28776 |
Severity: Low |
Description: Updated xen packages that resolve several security issues and a bug are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The xen packages contain the Xen tools and management daemons needed to manage virtual machines running on Red Hat Enterprise Linux. Xen was found to allow unprivileged DomU domains to overwrite xenstore values which should only be changeable by the privileged Dom0 domain. An attacker controlling a DomU domain could, potentially, use this flaw to kill arbitrary processes in Dom0 or trick a Dom0 user into accessing the text console of a different domain running on the same host. This update makes certain parts of the xenstore tree read-only to the unprivileged DomU domains. (CVE-2008-4405) | ||||
Applies to: xen |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29201 |
Title: RHSA-2009:0002 -- thunderbird security update |
Type: Software |
Bulletins:
MITRE:29201 |
Severity: Low |
Description: Updated thunderbird packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5511, CVE-2008-5512, CVE-2008-5513) | ||||
Applies to: thunderbird |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29215 |
Title: RHSA-2008:1036 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29215 |
Severity: Low |
Description: Note: after the errata packages are installed, Firefox must be restarted for the update to take effect. All firefox users should upgrade to these updated packages, which contain backported patches that correct these issues. | ||||
Applies to: firefox nspr nss xulrunner |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29137 |
Title: RHSA-2008:1029 -- cups security update |
Type: Services |
Bulletins:
MITRE:29137 |
Severity: Low |
Description: Updated cups packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. | ||||
Applies to: cups |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29210 |
Title: RHSA-2008:1023 -- pidgin security and bug fix update |
Type: Software |
Bulletins:
MITRE:29210 |
Severity: Low |
Description: Updated Pidgin packages that fix several security issues and bugs are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Pidgin is a multi-protocol Internet Messaging client. A denial-of-service flaw was found in Pidgin's MSN protocol handler. If a remote user was able to send, and the Pidgin user accepted, a carefully-crafted file request, it could result in Pidgin crashing. (CVE-2008-2955) | ||||
Applies to: pidgin |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29354 |
Title: RHSA-2008:1017 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:29354 |
Severity: Low |
Description: Updated kernel packages that resolve several security issues and fix various bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28976 |
Title: RHSA-2008:1016 -- enscript security update |
Type: Miscellaneous |
Bulletins:
MITRE:28976 |
Severity: Low |
Description: An updated enscript packages that fixes several security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GNU enscript converts ASCII files to PostScript(R) language files and spools the generated output to a specified printer or saves it to a file. Enscript can be extended to handle different output media and includes options for customizing printouts. Two buffer overflow flaws were found in GNU enscript. An attacker could craft an ASCII file in such a way that it could execute arbitrary commands if the file was opened with enscript with the special escapes option (-e or --escapes) enabled. (CVE-2008-3863, CVE-2008-4306) | ||||
Applies to: enscript |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29308 |
Title: RHSA-2008:1001 -- tog-pegasus security update |
Type: Software |
Bulletins:
MITRE:29308 |
Severity: Low |
Description: Updated tog-pegasus packages that fix security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The tog-pegasus packages provide OpenPegasus Web-Based Enterprise Management (WBEM) services. WBEM is a platform and resource independent Distributed Management Task Force (DMTF) standard that defines a common information model and communication protocol for monitoring and controlling resources. | ||||
Applies to: tog-pegasus |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29306 |
Title: RHSA-2008:0988 -- libxml2 security update |
Type: Miscellaneous |
Bulletins:
MITRE:29306 |
Severity: Low |
Description: Updated libxml2 packages that fix security issues are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. libxml2 is a library for parsing and manipulating XML files. It includes support for reading, modifying, and writing XML and HTML files. An integer overflow flaw causing a heap-based buffer overflow was found in the libxml2 XML parser. If an application linked against libxml2 processed untrusted, malformed XML content, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2008-4226) A denial of service flaw was discovered in the libxml2 XML parser. If an application linked against libxml2 processed untrusted, malformed XML content, it could cause the application to enter an infinite loop. (CVE-2008-4225) Red Hat would like to thank Drew Yao of the Apple Product Security team for reporting these issues. Users of libxml2 are advised to upgrade to these updated packages, which contain backported patches to correct these issues. | ||||
Applies to: libxml2 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29020 |
Title: RHSA-2008:0982 -- gnutls security update |
Type: Software |
Bulletins:
MITRE:29020 |
Severity: Low |
Description: Updated gnutls packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security (TLS). Martin von Gagern discovered a flaw in the way GnuTLS verified certificate chains provided by a server. A malicious server could use this flaw to spoof its identity by tricking client applications using the GnuTLS library to trust invalid certificates. (CVE-2008-4989) Users of GnuTLS are advised to upgrade to these updated packages, which contain a backported patch that corrects this issue. | ||||
Applies to: gnutls |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28686 |
Title: RHSA-2008:0981 -- ruby security update |
Type: Software |
Bulletins:
MITRE:28686 |
Severity: Low |
Description: Updated ruby packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. Vincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897 did not properly address a denial of service flaw in the WEBrick (Ruby HTTP server toolkit), known as CVE-2008-3656. This flaw allowed a remote attacker to send a specially-crafted HTTP request to a WEBrick server that would cause the server to use excessive CPU time. This update properly addresses this flaw. (CVE-2008-4310) All Ruby users should upgrade to these updated packages, which contain a correct patch that resolves this issue. | ||||
Applies to: ruby |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29237 |
Title: RHSA-2008:0978 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29237 |
Severity: Low |
Description: All firefox users should upgrade to these updated packages, which contain backported patches that correct these issues. | ||||
Applies to: devhelp firefox nss xulrunner yelp |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29116 |
Title: RHSA-2008:0976 -- thunderbird security update |
Type: Software |
Bulletins:
MITRE:29116 |
Severity: Low |
Description: Updated thunderbird packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-5014, CVE-2008-5016, CVE-2008-5017, CVE-2008-5018, CVE-2008-5021) | ||||
Applies to: thunderbird |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29197 |
Title: RHSA-2008:0971 -- net-snmp security update |
Type: Miscellaneous |
Bulletins:
MITRE:29197 |
Severity: Low |
Description: Updated net-snmp packages that fix a security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Simple Network Management Protocol (SNMP) is a protocol used for network management. A denial-of-service flaw was found in the way Net-SNMP processes SNMP GETBULK requests. A remote attacker who issued a specially-crafted request could cause the snmpd server to crash. (CVE-2008-4309) | ||||
Applies to: net-snmp |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29289 |
Title: RHSA-2008:0967 -- httpd security and bug fix update |
Type: Web |
Bulletins:
MITRE:29289 |
Severity: Low |
Description: Updated httpd packages that resolve several security issues and fix a bug are now available for Red Hat Enterprise Linux 3, 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Apache HTTP Server is a popular Web server. A flaw was found in the mod_proxy Apache module. An attacker in control of a Web server to which requests were being proxied could have caused a limited denial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364) | ||||
Applies to: httpd |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28964 |
Title: RHSA-2008:0965 -- lynx security update |
Type: Software |
Bulletins:
MITRE:28964 |
Severity: Low |
Description: An updated lynx package that corrects two security issues is now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Lynx is a text-based Web browser. | ||||
Applies to: lynx |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29265 |
Title: RHSA-2008:0957 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:29265 |
Severity: Low |
Description: Updated kernel packages that resolve several security issues and fix various bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The original packages distributed with this errata had a bug which prevented the Xen kernel booting on older hardware. We have updated the packages to correct this bug. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29199 |
Title: RHSA-2008:0946 -- ed security update |
Type: Software |
Bulletins:
MITRE:29199 |
Severity: Low |
Description: An updated ed package that fixes one security issue is now available for Red Hat Enterprise Linux 2.1, 3, 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. ed is a line-oriented text editor, used to create, display, and modify text files (both interactively and via shell scripts). A heap-based buffer overflow was discovered in the way ed, the GNU line editor, processed long file names. An attacker could create a file with a specially-crafted name that could possibly execute an arbitrary code when opened in the ed editor. (CVE-2008-3916) Users of ed should upgrade to this updated package, which contains a backported patch to resolve this issue. | ||||
Applies to: ed |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29069 |
Title: RHSA-2008:0939 -- openoffice.org security update |
Type: Software |
Bulletins:
MITRE:29069 |
Severity: Low |
Description: Updated openoffice.org packages that correct security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenOffice.org is an office productivity suite that includes desktop applications such as a word processor, spreadsheet, presentation manager, formula editor, and drawing program. | ||||
Applies to: openoffice.org openoffice.org2 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29185 |
Title: RHSA-2008:0937 -- cups security update |
Type: Services |
Bulletins:
MITRE:29185 |
Severity: Low |
Description: Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems. | ||||
Applies to: cups |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28693 |
Title: RHSA-2008:0908 -- thunderbird security update |
Type: Software |
Bulletins:
MITRE:28693 |
Severity: Low |
Description: Updated thunderbird packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-0016, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061, CVE-2008-4062) | ||||
Applies to: thunderbird |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29090 |
Title: RHSA-2008:0907 -- pam_krb5 security update |
Type: Services |
Bulletins:
MITRE:29090 |
Severity: Low |
Description: An updated pam_krb5 package that fixes a security issue is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The pam_krb5 module allows Pluggable Authentication Modules (PAM) aware applications to use Kerberos to verify user identities by obtaining user credentials at log in time. | ||||
Applies to: pam_krb5 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28242 |
Title: RHSA-2008:0897 -- ruby security update |
Type: Software |
Bulletins:
MITRE:28242 |
Severity: Low |
Description: Updated ruby packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for quick and easy object-oriented programming. The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs and a fixed source port when sending DNS requests. A remote attacker could use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905) | ||||
Applies to: ruby |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29039 |
Title: RHSA-2008:0893 -- bzip2 security update |
Type: Software |
Bulletins:
MITRE:29039 |
Severity: Low |
Description: Updated bzip2 packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Bzip2 is a freely available, high-quality data compressor. It provides both stand-alone compression and decompression utilities, as well as a shared library for use with other programs. A buffer over-read flaw was discovered in the bzip2 decompression routine. This issue could cause an application linked against the libbz2 library to crash when decompressing malformed archives. (CVE-2008-1372) Users of bzip2 should upgrade to these updated packages, which contain a backported patch to resolve this issue. | ||||
Applies to: bzip2 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28930 |
Title: RHSA-2008:0892 -- xen security and bug fix update |
Type: Software |
Bulletins:
MITRE:28930 |
Severity: Low |
Description: Updated xen packages that resolve a couple of security issues and fix a bug are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The xen packages contain tools for managing the virtual machine monitor in Red Hat Virtualization. | ||||
Applies to: xen |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29012 |
Title: RHSA-2008:0890 -- wireshark security update |
Type: Software |
Bulletins:
MITRE:29012 |
Severity: Low |
Description: Updated wireshark packages that fix several security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. Multiple buffer overflow flaws were found in Wireshark. If Wireshark read a malformed packet off a network, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2008-3146) | ||||
Applies to: wireshark |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29129 |
Title: RHSA-2008:0885 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:29129 |
Severity: Low |
Description: Updated kernel packages that fix various security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29030 |
Title: RHSA-2008:0884 -- libxml2 security update |
Type: Miscellaneous |
Bulletins:
MITRE:29030 |
Severity: Low |
Description: Updated libxml2 packages that fix a security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The libxml2 packages provide a library that allows you to manipulate XML files. It includes support to read, modify, and write XML and HTML files. A heap-based buffer overflow flaw was found in the way libxml2 handled long XML entity names. If an application linked against libxml2 processed untrusted malformed XML content, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2008-3529) All users of libxml2 are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. | ||||
Applies to: libxml2 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29008 |
Title: RHSA-2008:0879 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29008 |
Severity: Low |
Description: All firefox users should upgrade to this updated package, which contains backported patches that correct these issues. | ||||
Applies to: devhelp firefox nss xulrunner yelp |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29192 |
Title: RHSA-2008:0855 -- openssh security update |
Type: Services |
Bulletins:
MITRE:29192 |
Severity: Low |
Description: Updated openssh packages are now available for Red Hat Enterprise Linux 4, Red Hat Enterprise Linux 5, and Red Hat Enterprise Linux 4.5 Extended Update Support. This update has been rated as having critical security impact by the Red Hat Security Response Team. | ||||
Applies to: openssh |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29044 |
Title: RHSA-2008:0849 -- ipsec-tools security update |
Type: Miscellaneous |
Bulletins:
MITRE:29044 |
Severity: Low |
Description: An updated ipsec-tools package that fixes two security issues is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. | ||||
Applies to: ipsec-tools |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28973 |
Title: RHSA-2008:0847 -- libtiff security and bug fix update |
Type: Miscellaneous |
Bulletins:
MITRE:28973 |
Severity: Low |
Description: Updated libtiff packages that fix a security issue and a bug are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Multiple uses of uninitialized values were discovered in libtiff's Lempel-Ziv-Welch (LZW) compression algorithm decoder. An attacker could create a carefully crafted LZW-encoded TIFF file that would cause an application linked with libtiff to crash or, possibly, execute arbitrary code. (CVE-2008-2327) | ||||
Applies to: libtiff |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28256 |
Title: RHSA-2008:0839 -- postfix security update |
Type: |
Bulletins:
MITRE:28256 |
Severity: Low |
Description: Updated postfix packages that fix a security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), and TLS. A flaw was found in the way Postfix dereferences symbolic links. If a local user has write access to a mail spool directory with no root mailbox, it may be possible for them to append arbitrary data to files that root has write permission to. (CVE-2008-2936) Red Hat would like to thank Sebastian Krahmer for responsibly disclosing this issue. All users of postfix should upgrade to these updated packages, which contain a backported patch that resolves this issue. | ||||
Applies to: postfix |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29241 |
Title: RHSA-2008:0836 -- libxml2 security update |
Type: Miscellaneous |
Bulletins:
MITRE:29241 |
Severity: Low |
Description: Updated libxml2 packages that fix a security issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The original fix used in this errata caused some applications using the libxml2 library in an unexpected way to crash when used with updated libxml2 packages. We have updated the packages for Red Hat Enterprise Linux 3, 4 and 5 to use a different fix that does not break affected applications. | ||||
Applies to: libxml2 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29162 |
Title: RHSA-2008:0835 -- openoffice.org security update |
Type: Software |
Bulletins:
MITRE:29162 |
Severity: Low |
Description: Updated openoffice.org packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenOffice.org is an office productivity suite that includes desktop applications, such as a word processor, spreadsheet, presentation manager, formula editor, and a drawing program. A numeric truncation error was found in the OpenOffice.org memory allocator. If a carefully crafted file was opened by a victim, an attacker could use this flaw to crash OpenOffice.org or, possibly, execute arbitrary code. (CVE-2008-3282) All users of openoffice.org are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. | ||||
Applies to: openoffice.org |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29133 |
Title: RHSA-2008:0818 -- hplip security update |
Type: Miscellaneous |
Bulletins:
MITRE:29133 |
Severity: Low |
Description: Updated hplip packages that fix various security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The hplip (Hewlett-Packard Linux Imaging and Printing) packages provide drivers for Hewlett-Packard printers and multifunction peripherals. A flaw was discovered in the hplip alert-mailing functionality. A local attacker could elevate their privileges by using specially-crafted packets to trigger alert mails, which are sent by the root account. (CVE-2008-2940) A flaw was discovered in the hpssd message parser. By sending specially-crafted packets, a local attacker could cause a denial of service, stopping the hpssd process. (CVE-2008-2941) Users of hplip should upgrade to these updated packages, which contain backported patches to correct these issues. | ||||
Applies to: hplip |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28842 |
Title: RHSA-2008:0815 -- yum-rhn-plugin security update |
Type: Software |
Bulletins:
MITRE:28842 |
Severity: Low |
Description: Updated yum-rhn-plugin packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The yum-rhn-plugin provides support for yum to securely access a Red Hat Network (RHN) server for software updates. | ||||
Applies to: yum-rhn-plugin |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29167 |
Title: RHSA-2008:0789 -- dnsmasq security update |
Type: DNS |
Bulletins:
MITRE:29167 |
Severity: Low |
Description: An updated dnsmasq package that implements UDP source-port randomization is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Dnsmasq is lightweight DNS forwarder and DHCP server. It is designed to provide DNS and, optionally, DHCP, to a small network. The dnsmasq DNS resolver used a fixed source UDP port. This could have made DNS spoofing attacks easier. dnsmasq has been updated to use random UDP source ports, helping to make DNS spoofing attacks harder. (CVE-2008-1447) All dnsmasq users are advised to upgrade to this updated package, that upgrades dnsmasq to version 2.45, which resolves this issue. | ||||
Applies to: dnsmasq |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29029 |
Title: RHSA-2008:0649 -- libxslt security update |
Type: Miscellaneous |
Bulletins:
MITRE:29029 |
Severity: Low |
Description: Updated libxslt packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. libxslt is a library for transforming XML files into other XML files using the standard XSLT stylesheet transformation mechanism. A heap buffer overflow flaw was discovered in the RC4 libxslt library extension. An attacker could create a malicious XSL file that would cause a crash, or, possibly, execute arbitrary code with the privileges of the application using the libxslt library to perform XSL transformations on untrusted XSL style sheets. (CVE-2008-2935) Red Hat would like to thank Chris Evans for reporting this vulnerability. All libxslt users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. | ||||
Applies to: libxslt |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28407 |
Title: RHSA-2008:0648 -- tomcat security update |
Type: Web |
Bulletins:
MITRE:28407 |
Severity: Low |
Description: Updated tomcat packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. A cross-site scripting vulnerability was discovered in the HttpServletResponse.sendErrormethod. A remote attacker could inject arbitrary web script or HTML via forged HTTP headers. (CVE-2008-1232) | ||||
Applies to: tomcat5 |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28716 |
Title: RHSA-2008:0616 -- thunderbird security update |
Type: Software |
Bulletins:
MITRE:28716 |
Severity: Low |
Description: Updated thunderbird packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. Multiple flaws were found in the processing of malformed JavaScript content. An HTML mail containing such malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) | ||||
Applies to: thunderbird |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28983 |
Title: RHSA-2008:0612 -- kernel security and bug fix update |
Type: Software |
Bulletins:
MITRE:28983 |
Severity: Low |
Description: Updated kernel packages that fix various security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system. | ||||
Applies to: kernel |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29066 |
Title: RHSA-2008:0597 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29066 |
Severity: Low |
Description: Updated firefox packages that fix various security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. The nspluginwrapper package has been added to this advisory to satisfy a missing package dependency issue. Mozilla Firefox is an open source Web browser. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious web site could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) All firefox users should upgrade to these updated packages, which contain Firefox 3.0.1 that corrects these issues. | ||||
Applies to: devhelp firefox nspluginwrapper xulrunner yelp |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29144 |
Title: RHSA-2008:0584 -- pidgin security and bug fix update |
Type: Software |
Bulletins:
MITRE:29144 |
Severity: Low |
Description: Updated Pidgin packages that fix a security issue and address a bug are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Pidgin is a multi-protocol Internet Messaging client. | ||||
Applies to: pidgin |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29038 |
Title: RHSA-2008:0583 -- openldap security update |
Type: Services |
Bulletins:
MITRE:29038 |
Severity: Low |
Description: Updated openldap packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenLDAP is an open source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols for accessing directory services. A denial of service flaw was found in the way the OpenLDAP slapd daemon processed certain network messages. An unauthenticated remote attacker could send a specially crafted request that would crash the slapd daemon. (CVE-2008-2952) Users of openldap should upgrade to these updated packages, which contain a backported patch to correct this issue. | ||||
Applies to: openldap |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29255 |
Title: RHSA-2008:0581 -- bluez-libs and bluez-utils security update |
Type: Software |
Bulletins:
MITRE:29255 |
Severity: Low |
Description: Updated bluez-libs and bluez-utils packages that fix a security flaw are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The bluez-libs package contains libraries for use in Bluetooth applications. The bluez-utils package contains Bluetooth daemons and utilities. An input validation flaw was found in the Bluetooth Session Description Protocol (SDP) packet parser used by the Bluez Bluetooth utilities. A Bluetooth device with an already-established trust relationship, or a local user registering a service record via a UNIX reg; socket or D-Bus interface, could cause a crash, or possibly execute arbitrary code with privileges of the hcid daemon. (CVE-2008-2374) Users of bluez-libs and bluez-utils are advised to upgrade to these updated packages, which contains a backported patch to correct this issue. | ||||
Applies to: bluez-libs bluez-utils |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29232 |
Title: RHSA-2008:0580 -- vim security update |
Type: Software |
Bulletins:
MITRE:29232 |
Severity: Low |
Description: Updated vim packages that fix security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Vim (Visual editor IMproved) is an updated and improved version of the vi editor. | ||||
Applies to: vim |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29234 |
Title: RHSA-2008:0575 -- rdesktop security update |
Type: Miscellaneous |
Bulletins:
MITRE:29234 |
Severity: Low |
Description: An updated rdesktop package that fixes a security issue is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. rdesktop is an open source client for Microsoft Windows NT Terminal Server and Microsoft Windows 2000 and 2003 Terminal Services, capable of natively using the Remote Desktop Protocol (RDP) to present the user's NT desktop. No additional server extensions are required. An integer underflow and integer signedness issue were discovered in the rdesktop. If an attacker could convince a victim to connect to a malicious RDP server, the attacker could cause the victim's rdesktop to crash or, possibly, execute an arbitrary code. (CVE-2008-1801, CVE-2008-1803) Users of rdesktop should upgrade to these updated packages, which contain a backported patches to resolve these issues. | ||||
Applies to: rdesktop |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29028 |
Title: RHSA-2008:0569 -- firefox security update |
Type: Software |
Bulletins:
MITRE:29028 |
Severity: Low |
Description: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. Multiple flaws were found in the processing of malformed JavaScript content. A web page containing such malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) | ||||
Applies to: devhelp firefox xulrunner yelp |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28980 |
Title: RHSA-2008:0561 -- ruby security update |
Type: Software |
Bulletins:
MITRE:28980 |
Severity: Low |
Description: Updated ruby packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for quick and easy object-oriented programming. Multiple integer overflows leading to a heap overflow were discovered in the array- and string-handling code used by Ruby. An attacker could use these flaws to crash a Ruby application or, possibly, execute arbitrary code with the privileges of the Ruby application using untrusted inputs in array or string operations. (CVE-2008-2376, CVE-2008-2662, CVE-2008-2663, CVE-2008-2725, CVE-2008-2726) | ||||
Applies to: ruby |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:29150 |
Title: RHSA-2008:0544 -- php security update |
Type: Web |
Bulletins:
MITRE:29150 |
Severity: Low |
Description: Updated PHP packages that fix several security issues are now available for Red Hat Enterprise Linux 3 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server. It was discovered that the PHP escapeshellcmdfunction did not properly escape multi-byte characters which are not valid in the locale used by the script. This could allow an attacker to bypass quoting restrictions imposed by escapeshellcmdand execute arbitrary commands if the PHP script was using certain locales. Scripts using the default UTF-8 locale are not affected by this issue. (CVE-2008-2051) | ||||
Applies to: php |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28787 |
Title: RHSA-2008:0533 -- bind security update |
Type: Software |
Bulletins:
MITRE:28787 |
Severity: Low |
Description: Updated bind packages that help mitigate DNS spoofing attacks are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. We have updated the Enterprise Linux 5 packages in this advisory. The default and sample caching-nameserver configuration files have been updated so that they do not specify a fixed query-source port. Administrators wishing to take advantage of randomized UDP source ports should check their configuration file to ensure they have not specified fixed query-source ports. ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. | ||||
Applies to: bind selinux-policy selinux-policy-targeted |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28887 |
Title: RHSA-2008:0486 -- nfs-utils security update |
Type: Miscellaneous |
Bulletins:
MITRE:28887 |
Severity: Low |
Description: An updated nfs-utils package that fixes a security issue is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The nfs-utils package provides a daemon for the kernel NFS server and related tools. A flaw was found in the nfs-utils package build. The nfs-utils package was missing TCP wrappers support, which could result in an administrator believing they had access restrictions enabled when they did not. (CVE-2008-1376) Users of nfs-utils are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. | ||||
Applies to: nfs-utils |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: MITRE:28823 |
Title: ELSA-2015-1189 -- kvm security update |
Type: Miscellaneous |
Bulletins:
MITRE:28823 |
Severity: Low |
Description: [kvm-83-273.0.1.el5] - Added kvm-add-oracle-workaround-for-libvirt-bug.patch - Added kvm-Introduce-oel-machine-type.patch [kvm-83.273.el5] - kvm-pcnet-Properly-handle-TX-requests-during-Link-Fail.patch [bz#1225896] - kvm-pcnet-fix-Negative-array-index-read.patch [bz#1225896] - kvm-pcnet-force-the-buffer-access-to-be-in-bounds-during.patch [bz#1225896] - Resolves: bz#1225896 (EMBARGOED CVE-2015-3209 kvm: qemu: pcnet: multi-tmd buffer overflow in the tx path [rhel-5.11.z) | ||||
Applies to: kmod-kvm kmod-kvm-debug kvm kvm-qemu-img kvm-tools |
Created: 2015-06-29 |
Updated: 2015-08-17 |
ID: CVE-2015-4199 |
Title: Race condition in the IPv6-to-IPv4 functionality in Cisco IOS 15.3S in the Performance Routing Engine (PRE) module on UBR devices allows remote attackers to cause a denial of service (NULL pointer free and module crash) by triggering intermittent... |
Type: Hardware |
Bulletins:
CVE-2015-4199 SFBID75335 |
Severity: High |
Description: Race condition in the IPv6-to-IPv4 functionality in Cisco IOS 15.3S in the Performance Routing Engine (PRE) module on UBR devices allows remote attackers to cause a denial of service (NULL pointer free and module crash) by triggering intermittent connectivity with many IPv6 CPE devices, aka Bug ID CSCug47366. | ||||
Applies to: |
Created: 2015-06-27 |
Updated: 2024-09-07 |
ID: CVE-2015-4225 |
Title: Cisco Application Policy Infrastructure Controller (APIC) 1.0(1.110a) and 1.0(1e) on Nexus 9000 devices does not properly implement RBAC health scoring, which allows remote authenticated users to obtain sensitive information via unspecified vectors,... |
Type: Hardware |
Bulletins:
CVE-2015-4225 SFBID75433 |
Severity: Medium |
Description: Cisco Application Policy Infrastructure Controller (APIC) 1.0(1.110a) and 1.0(1e) on Nexus 9000 devices does not properly implement RBAC health scoring, which allows remote authenticated users to obtain sensitive information via unspecified vectors, aka Bug ID CSCuq77485. | ||||
Applies to: |
Created: 2015-06-27 |
Updated: 2024-09-07 |
ID: CVE-2015-4224 |
Title: Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0) allow local users to execute arbitrary OS commands in a privileged context via crafted CLI commands, aka Bug ID CSCuj39474. |
Type: Hardware |
Bulletins:
CVE-2015-4224 SFBID75415 |
Severity: High |
Description: Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0) allow local users to execute arbitrary OS commands in a privileged context via crafted CLI commands, aka Bug ID CSCuj39474. | ||||
Applies to: |
Created: 2015-06-26 |
Updated: 2024-09-07 |
ID: CVE-2015-4223 |
Title: Cisco IOS XR 5.1.3 allows remote attackers to cause a denial of service (process reload) via crafted MPLS Label Distribution Protocol (LDP) packets, aka Bug ID CSCuu77478. |
Type: Hardware |
Bulletins:
CVE-2015-4223 SFBID75399 |
Severity: Medium |
Description: Cisco IOS XR 5.1.3 allows remote attackers to cause a denial of service (process reload) via crafted MPLS Label Distribution Protocol (LDP) packets, aka Bug ID CSCuu77478. | ||||
Applies to: |
Created: 2015-06-25 |
Updated: 2024-09-07 |
ID: CVE-2015-4215 |
Title: Cisco Wireless LAN Controller (WLC) devices with software 7.5(102.0) and 7.6(1.62) allow remote attackers to cause a denial of service (device crash) by triggering an exception during attempted forwarding of unspecified IPv6 packets to a non-IPv6... |
Type: Hardware |
Bulletins:
CVE-2015-4215 SFBID75369 |
Severity: Medium |
Description: Cisco Wireless LAN Controller (WLC) devices with software 7.5(102.0) and 7.6(1.62) allow remote attackers to cause a denial of service (device crash) by triggering an exception during attempted forwarding of unspecified IPv6 packets to a non-IPv6 device, aka Bug ID CSCuj01046. | ||||
Applies to: |
Created: 2015-06-24 |
Updated: 2024-09-07 |
ID: CVE-2015-4213 |
Title: Cisco NX-OS 1.1(1g) on Nexus 9000 devices allows remote authenticated users to discover cleartext passwords by leveraging the existence of a decryption mechanism, aka Bug ID CSCuu84391. |
Type: Hardware |
Bulletins:
CVE-2015-4213 SFBID75378 |
Severity: Medium |
Description: Cisco NX-OS 1.1(1g) on Nexus 9000 devices allows remote authenticated users to discover cleartext passwords by leveraging the existence of a decryption mechanism, aka Bug ID CSCuu84391. | ||||
Applies to: |
Created: 2015-06-24 |
Updated: 2024-09-07 |
ID: CVE-2015-4203 |
Title: Race condition in Cisco IOS 12.2SCH in the Performance Routing Engine (PRE) module on uBR10000 devices, when NetFlow and an MPLS IPv6 VPN are configured, allows remote attackers to cause a denial of service (PXF process crash) by sending malformed... |
Type: Hardware |
Bulletins:
CVE-2015-4203 SFBID75339 |
Severity: Medium |
Description: Race condition in Cisco IOS 12.2SCH in the Performance Routing Engine (PRE) module on uBR10000 devices, when NetFlow and an MPLS IPv6 VPN are configured, allows remote attackers to cause a denial of service (PXF process crash) by sending malformed MPLS 6VPE packets quickly, aka Bug ID CSCud83396. | ||||
Applies to: |
Created: 2015-06-23 |
Updated: 2024-09-07 |
ID: CVE-2015-4200 |
Title: Memory leak in the IPv6-to-IPv4 functionality in Cisco IOS 15.3S in the Performance Routing Engine (PRE) module on UBR devices allows remote attackers to cause a denial of service (memory consumption) by triggering an error during CPE negotiation,... |
Type: Hardware |
Bulletins:
CVE-2015-4200 SFBID75254 |
Severity: High |
Description: Memory leak in the IPv6-to-IPv4 functionality in Cisco IOS 15.3S in the Performance Routing Engine (PRE) module on UBR devices allows remote attackers to cause a denial of service (memory consumption) by triggering an error during CPE negotiation, aka Bug ID CSCug00885. | ||||
Applies to: |
Created: 2015-06-23 |
Updated: 2024-09-07 |
ID: CVE-2015-4204 |
Title: Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests... |
Type: Hardware |
Bulletins:
CVE-2015-4204 SFBID75337 |
Severity: Medium |
Description: Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051. | ||||
Applies to: |
Created: 2015-06-23 |
Updated: 2024-09-07 |
ID: CVE-2015-4205 |
Title: Cisco IOS XR 5.3.1 on ASR 9000 devices allows remote attackers to cause a denial of service (NPU chip reset or line-card reload) by sending crafted IEEE 802.3x flow-control PAUSE frames on the local network, aka Bug ID CSCut19959. |
Type: Hardware |
Bulletins:
CVE-2015-4205 SFBID75352 |
Severity: Medium |
Description: Cisco IOS XR 5.3.1 on ASR 9000 devices allows remote attackers to cause a denial of service (NPU chip reset or line-card reload) by sending crafted IEEE 802.3x flow-control PAUSE frames on the local network, aka Bug ID CSCut19959. | ||||
Applies to: |
Created: 2015-06-23 |
Updated: 2024-09-07 |
ID: MITRE:29009 |
Title: MSXML3 same origin policy SFB vulnerability |
Type: Software |
Bulletins:
MITRE:29009 CVE-2015-1646 |
Severity: Medium |
Description: Microsoft XML Core Services (aka MSXML) 3.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted DTD, aka "MSXML3 Same Origin Policy SFB Vulnerability." | ||||
Applies to: Microsoft XML Core Services 3.0 |
Created: 2015-06-22 |
Updated: 2024-09-07 |
ID: CVE-2015-4197 |
Title: Cisco NX-OS 5.2(5) on Nexus 7000 devices allows remote attackers to cause a denial of service (device crash) by sending a malformed LLDP packet on the local network, aka Bug ID CSCud89415. |
Type: Hardware |
Bulletins:
CVE-2015-4197 SFBID75324 |
Severity: Medium |
Description: Cisco NX-OS 5.2(5) on Nexus 7000 devices allows remote attackers to cause a denial of service (device crash) by sending a malformed LLDP packet on the local network, aka Bug ID CSCud89415. | ||||
Applies to: |
Created: 2015-06-20 |
Updated: 2024-09-07 |
ID: CVE-2015-4202 |
Title: Cisco IOS 12.2SCH on uBR10000 router Cable Modem Termination Systems (CMTS) does not properly restrict access to the IP Detail Record (IPDR) service, which allows remote attackers to obtain potentially sensitive MAC address and network-utilization... |
Type: Hardware |
Bulletins:
CVE-2015-4202 SFBID75321 |
Severity: Medium |
Description: Cisco IOS 12.2SCH on uBR10000 router Cable Modem Termination Systems (CMTS) does not properly restrict access to the IP Detail Record (IPDR) service, which allows remote attackers to obtain potentially sensitive MAC address and network-utilization information via crafted IPDR packets, aka Bug ID CSCua39203. | ||||
Applies to: |
Created: 2015-06-20 |
Updated: 2024-09-07 |
ID: CVE-2015-4191 |
Title: Cisco IOS XR 5.2.1 allows remote attackers to cause a denial of service (ipv6_io service reload) via a malformed IPv6 packet, aka Bug ID CSCuq95565. |
Type: Hardware |
Bulletins:
CVE-2015-4191 SFBID75260 |
Severity: Medium |
Description: Cisco IOS XR 5.2.1 allows remote attackers to cause a denial of service (ipv6_io service reload) via a malformed IPv6 packet, aka Bug ID CSCuq95565. | ||||
Applies to: |
Created: 2015-06-18 |
Updated: 2024-09-07 |
ID: CVE-2015-4195 |
Title: Cisco IOS XR 5.1.1.K9SEC allows remote authenticated users to cause a denial of service (vty error, and SSH and TELNET outage) via a crafted disconnect action within an SSH session, aka Bug ID CSCul63127. |
Type: Hardware |
Bulletins:
CVE-2015-4195 SFBID75295 |
Severity: Medium |
Description: Cisco IOS XR 5.1.1.K9SEC allows remote authenticated users to cause a denial of service (vty error, and SSH and TELNET outage) via a crafted disconnect action within an SSH session, aka Bug ID CSCul63127. | ||||
Applies to: |
Created: 2015-06-18 |
Updated: 2024-09-07 |
ID: MITRE:28440 |
Title: RHSA-2015:1115-01 -- Redhat openssl |
Type: Web |
Bulletins:
MITRE:28440 |
Severity: Low |
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. A flaw was found in the way the OpenSSL packages shipped with Red Hat Enterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes function. This issue could possibly cause a multi-threaded application using OpenSSL to perform an out-of-bounds read and crash. An out-of-bounds read flaw was found in the X509_cmp_time function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List could possibly cause a TLS/SSL server or client using OpenSSL to crash. A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. A flaw was found in the way OpenSSL handled Cryptographic Message Syntax messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and CVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan Fratric as the original reporters of CVE-2014-8176, Robert Swiecki and Hanno Bock as the original reporters of CVE-2015-1789, Michal Zalewski as the original reporter of CVE-2015-1790, Emilia Kasper as the original report of CVE-2015-1791 and Johannes Bauer as the original reporter of CVE-2015-1792. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. | ||||
Applies to: openssl |
Created: 2015-06-16 |
Updated: 2015-07-27 |
ID: MITRE:29126 |
Title: ELSA-2015-1115 -- Oracle openssl |
Type: Web |
Bulletins:
MITRE:29126 |
Severity: Low |
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. A flaw was found in the way the OpenSSL packages shipped with Red Hat Enterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes function. This issue could possibly cause a multi-threaded application using OpenSSL to perform an out-of-bounds read and crash. An out-of-bounds read flaw was found in the X509_cmp_time function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List could possibly cause a TLS/SSL server or client using OpenSSL to crash. A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. A flaw was found in the way OpenSSL handled Cryptographic Message Syntax messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and CVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan Fratric as the original reporters of CVE-2014-8176, Robert Swiecki and Hanno Bock as the original reporters of CVE-2015-1789, Michal Zalewski as the original reporter of CVE-2015-1790, Emilia Kasper as the original report of CVE-2015-1791 and Johannes Bauer as the original reporter of CVE-2015-1792. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. | ||||
Applies to: openssl |
Created: 2015-06-16 |
Updated: 2015-07-27 |
ID: MITRE:28643 |
Title: ELSA-2015-1115 -- Oracle openssl |
Type: Web |
Bulletins:
MITRE:28643 |
Severity: Low |
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. A flaw was found in the way the OpenSSL packages shipped with Red Hat Enterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes function. This issue could possibly cause a multi-threaded application using OpenSSL to perform an out-of-bounds read and crash. An out-of-bounds read flaw was found in the X509_cmp_time function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List could possibly cause a TLS/SSL server or client using OpenSSL to crash. A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. A flaw was found in the way OpenSSL handled Cryptographic Message Syntax messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and CVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan Fratric as the original reporters of CVE-2014-8176, Robert Swiecki and Hanno Bock as the original reporters of CVE-2015-1789, Michal Zalewski as the original reporter of CVE-2015-1790, Emilia Kasper as the original report of CVE-2015-1791 and Johannes Bauer as the original reporter of CVE-2015-1792. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. | ||||
Applies to: openssl |
Created: 2015-06-16 |
Updated: 2015-07-27 |
ID: MITRE:29099 |
Title: CESA-2015:1115 -- centos 7 openssl |
Type: Web |
Bulletins:
MITRE:29099 |
Severity: Low |
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. A flaw was found in the way the OpenSSL packages shipped with Red Hat Enterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes function. This issue could possibly cause a multi-threaded application using OpenSSL to perform an out-of-bounds read and crash. An out-of-bounds read flaw was found in the X509_cmp_time function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List could possibly cause a TLS/SSL server or client using OpenSSL to crash. A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. A flaw was found in the way OpenSSL handled Cryptographic Message Syntax messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and CVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan Fratric as the original reporters of CVE-2014-8176, Robert Swiecki and Hanno Bock as the original reporters of CVE-2015-1789, Michal Zalewski as the original reporter of CVE-2015-1790, Emilia Kasper as the original report of CVE-2015-1791 and Johannes Bauer as the original reporter of CVE-2015-1792. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. | ||||
Applies to: openssl |
Created: 2015-06-16 |
Updated: 2015-07-27 |
ID: MITRE:28674 |
Title: CESA-2015:1115 -- centos 6 openssl |
Type: Web |
Bulletins:
MITRE:28674 |
Severity: Low |
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. A flaw was found in the way the OpenSSL packages shipped with Red Hat Enterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes function. This issue could possibly cause a multi-threaded application using OpenSSL to perform an out-of-bounds read and crash. An out-of-bounds read flaw was found in the X509_cmp_time function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List could possibly cause a TLS/SSL server or client using OpenSSL to crash. A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. A flaw was found in the way OpenSSL handled Cryptographic Message Syntax messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and CVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan Fratric as the original reporters of CVE-2014-8176, Robert Swiecki and Hanno Bock as the original reporters of CVE-2015-1789, Michal Zalewski as the original reporter of CVE-2015-1790, Emilia Kasper as the original report of CVE-2015-1791 and Johannes Bauer as the original reporter of CVE-2015-1792. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. | ||||
Applies to: openssl |
Created: 2015-06-16 |
Updated: 2015-07-27 |
ID: CVE-2015-4185 |
Title: The TCL interpreter in Cisco IOS 15.2 does not properly maintain the vty state, which allows local users to gain privileges by starting a session very soon after a TCL script execution, aka Bug ID CSCuq24202. |
Type: Hardware |
Bulletins:
CVE-2015-4185 SFBID72310 |
Severity: Medium |
Description: The TCL interpreter in Cisco IOS 15.2 does not properly maintain the vty state, which allows local users to gain privileges by starting a session very soon after a TCL script execution, aka Bug ID CSCuq24202. | ||||
Applies to: |
Created: 2015-06-13 |
Updated: 2024-09-07 |
ID: CVE-2015-0771 |
Title: The IKE implementation in the WS-IPSEC-3 service module in Cisco IOS 12.2 on Catalyst 6500 devices allows remote authenticated users to cause a denial of service (device reload) by sending a crafted message during IPsec tunnel setup, aka Bug ID... |
Type: Hardware |
Bulletins:
CVE-2015-0771 |
Severity: Medium |
Description: The IKE implementation in the WS-IPSEC-3 service module in Cisco IOS 12.2 on Catalyst 6500 devices allows remote authenticated users to cause a denial of service (device reload) by sending a crafted message during IPsec tunnel setup, aka Bug ID CSCur70505. | ||||
Applies to: |
Created: 2015-06-12 |
Updated: 2024-09-07 |
ID: CVE-2015-0775 |
Title: The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000... |
Type: Hardware |
Bulletins:
CVE-2015-0775 |
Severity: Medium |
Description: The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182. | ||||
Applies to: Cisco Nexus 1000V VSM |
Created: 2015-06-12 |
Updated: 2024-09-07 |
ID: CVE-2015-0776 |
Title: telnetd in Cisco IOS XR 5.0.1 on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (device reload) via a malformed TELNET packet, aka Bug ID CSCuq31566. |
Type: Hardware |
Bulletins:
CVE-2015-0776 |
Severity: Medium |
Description: telnetd in Cisco IOS XR 5.0.1 on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (device reload) via a malformed TELNET packet, aka Bug ID CSCuq31566. | ||||
Applies to: |
Created: 2015-06-12 |
Updated: 2024-09-07 |
ID: MITRE:28539 |
Title: RHSA-2015:1002-01 -- Redhat xen |
Type: Software |
Bulletins:
MITRE:28539 |
Severity: Low |
Description: The xen packages contain administration tools and the xend service for managing the kernel-xen kernel for virtualization on Red Hat Enterprise Linux. An out-of-bounds memory access flaw was found in the way QEMU"s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host"s QEMU process corresponding to the guest. Red Hat would like to thank Jason Geffner of CrowdStrike for reporting this issue. All xen users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, all running fully-virtualized guests must be restarted for this update to take effect. | ||||
Applies to: xen |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:28106 |
Title: RHSA-2015:0999-01 -- Redhat qemu-kvm, libcacard |
Type: Software |
Bulletins:
MITRE:28106 |
Severity: Low |
Description: KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU"s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host"s QEMU process corresponding to the guest. Red Hat would like to thank Jason Geffner of CrowdStrike for reporting this issue. All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. | ||||
Applies to: libcacard qemu-kvm |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:28702 |
Title: RHSA-2015:0998-01 -- Redhat qemu-kvm, qemu-guest-agent |
Type: Software |
Bulletins:
MITRE:28702 |
Severity: Low |
Description: KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU"s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host"s QEMU process corresponding to the guest. Red Hat would like to thank Jason Geffner of CrowdStrike for reporting this issue. All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. | ||||
Applies to: qemu-guest-agent qemu-kvm |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:28949 |
Title: ELSA-2015-1003 -- Oracle kvm-83 |
Type: Software |
Bulletins:
MITRE:28949 |
Severity: Low |
Description: The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM. | ||||
Applies to: kvm-83 |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:28974 |
Title: ELSA-2015-1002 -- Oracle xen |
Type: Software |
Bulletins:
MITRE:28974 |
Severity: Low |
Description: The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM. | ||||
Applies to: xen |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:28893 |
Title: ELSA-2015-0999 -- Oracle qemu-kvm |
Type: Software |
Bulletins:
MITRE:28893 |
Severity: Low |
Description: KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU"s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host"s QEMU process corresponding to the guest. Red Hat would like to thank Jason Geffner of CrowdStrike for reporting this issue. All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. | ||||
Applies to: libcacard qemu-kvm |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:29004 |
Title: ELSA-2015-0998 -- Oracle qemu-kvm_qemu-guest-agent |
Type: Software |
Bulletins:
MITRE:29004 |
Severity: Low |
Description: KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU"s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host"s QEMU process corresponding to the guest. Red Hat would like to thank Jason Geffner of CrowdStrike for reporting this issue. All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. | ||||
Applies to: qemu-guest-agent qemu-kvm |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:28198 |
Title: CESA-2015:1003 -- centos 5 kvm |
Type: Miscellaneous |
Bulletins:
MITRE:28198 |
Severity: Low |
Description: KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. An out-of-bounds memory access flaw was found in the way QEMU"s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host"s QEMU process corresponding to the guest. Red Hat would like to thank Jason Geffner of CrowdStrike for reporting this issue. All kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. Note: The procedure in the Solution section must be performed before this update will take effect. | ||||
Applies to: kvm |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:28937 |
Title: CESA-2015:1002 -- centos 5 xen |
Type: Software |
Bulletins:
MITRE:28937 |
Severity: Low |
Description: The xen packages contain administration tools and the xend service for managing the kernel-xen kernel for virtualization on Red Hat Enterprise Linux. An out-of-bounds memory access flaw was found in the way QEMU"s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host"s QEMU process corresponding to the guest. Red Hat would like to thank Jason Geffner of CrowdStrike for reporting this issue. All xen users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, all running fully-virtualized guests must be restarted for this update to take effect. | ||||
Applies to: xen |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:28600 |
Title: CESA-2015:0999 -- centos 7 qemu-kvm,libcacard |
Type: Software |
Bulletins:
MITRE:28600 |
Severity: Low |
Description: KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU"s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host"s QEMU process corresponding to the guest. Red Hat would like to thank Jason Geffner of CrowdStrike for reporting this issue. All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. | ||||
Applies to: libcacard qemu-kvm |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:28912 |
Title: CESA-2015:0998 -- centos 6 qemu-kvm,qemu-guest-agent |
Type: Software |
Bulletins:
MITRE:28912 |
Severity: Low |
Description: KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU"s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host"s QEMU process corresponding to the guest. Red Hat would like to thank Jason Geffner of CrowdStrike for reporting this issue. All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. | ||||
Applies to: qemu-guest-agent qemu-kvm |
Created: 2015-06-02 |
Updated: 2015-07-13 |
ID: MITRE:28603 |
Title: Windows MS-DOS device name vulnerability |
Type: Software |
Bulletins:
MITRE:28603 CVE-2015-1644 |
Severity: High |
Description: Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Windows MS-DOS Device Name Vulnerability." | ||||
Applies to: |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28397 |
Title: Windows Hyper-V DoS vulnerability |
Type: Software |
Bulletins:
MITRE:28397 CVE-2015-1647 |
Severity: Low |
Description: Virtual Machine Manager (VMM) in Hyper-V in Microsoft Windows 8.1 and Windows Server 2012 R2 allows guest OS users to cause a denial of service (VMM functionality loss) via a crafted application, aka "Windows Hyper-V DoS Vulnerability." | ||||
Applies to: Microsoft Hyper-V Server |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28831 |
Title: NtCreateTransactionManager type confusion vulnerability |
Type: Software |
Bulletins:
MITRE:28831 CVE-2015-1643 |
Severity: High |
Description: Microsoft Windows Server 2003 R2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "NtCreateTransactionManager Type Confusion Vulnerability." | ||||
Applies to: |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28523 |
Title: Microsoft SharePoint XSS vulnerability |
Type: Software |
Bulletins:
MITRE:28523 CVE-2015-1653 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Foundation 2013 SP1 and SharePoint Server 2013 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted request, aka "Microsoft SharePoint XSS Vulnerability." | ||||
Applies to: Microsoft SharePoint Foundation 2013 Microsoft SharePoint Server 2013 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28565 |
Title: Microsoft SharePoint XSS vulnerability |
Type: Software |
Bulletins:
MITRE:28565 CVE-2015-1640 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in Microsoft Project Server 2010 SP2 and 2013 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted request, aka "Microsoft SharePoint XSS Vulnerability." | ||||
Applies to: Microsoft Project Server 2010 Microsoft Project Server 2013 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:27878 |
Title: Microsoft office memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:27878 CVE-2015-1641 |
Severity: High |
Description: Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Office Compatibility Pack Microsoft Office Web Apps 2010 Microsoft Office Web Apps Server 2013 Microsoft SharePoint Server 2010 Microsoft SharePoint Server 2013 Microsoft Word 2007 Microsoft Word 2010 Microsoft Word 2013 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28561 |
Title: Microsoft office component use after free vulnerability |
Type: Software |
Bulletins:
MITRE:28561 CVE-2015-1650 |
Severity: High |
Description: Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." | ||||
Applies to: Microsoft Office Compatibility Pack Microsoft Office Web Apps 2010 Microsoft Office Web Apps Server 2013 Microsoft SharePoint Server 2010 Microsoft SharePoint Server 2013 Microsoft Word 2007 Microsoft Word 2010 Microsoft Word 2013 Microsoft Word... |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28690 |
Title: Microsoft office component use after free vulnerability |
Type: Software |
Bulletins:
MITRE:28690 CVE-2015-1649 |
Severity: High |
Description: Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps Server 2010 SP2 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." | ||||
Applies to: Microsoft Office Compatibility Pack Microsoft Office Web Apps 2010 Microsoft SharePoint Server 2010 Microsoft Word 2007 Microsoft Word 2010 Microsoft Word Viewer |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28752 |
Title: Microsoft office component use after free vulnerability |
Type: Software |
Bulletins:
MITRE:28752 CVE-2015-1651 |
Severity: High |
Description: Use-after-free vulnerability in Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." | ||||
Applies to: Microsoft Office Compatibility Pack Microsoft Word 2007 Microsoft Word Viewer |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28861 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28861 CVE-2015-1666 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1652. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28865 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28865 CVE-2015-1660 |
Severity: High |
Description: Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 9 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:27899 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:27899 CVE-2015-1652 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1666. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:27908 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:27908 CVE-2015-1667 |
Severity: High |
Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28895 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28895 CVE-2015-1668 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28574 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28574 CVE-2015-1659 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1662 and CVE-2015-1665. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28704 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28704 CVE-2015-1657 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28709 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28709 CVE-2015-1665 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1659 and CVE-2015-1662. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28783 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28783 CVE-2015-1662 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1659 and CVE-2015-1665. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28821 |
Title: Internet Explorer ASLR bypass vulnerability |
Type: Web |
Bulletins:
MITRE:28821 CVE-2015-1661 |
Severity: Medium |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28623 |
Title: HTTP.sys Remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28623 CVE-2015-1635 |
Severity: High |
Description: HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability." | ||||
Applies to: |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28101 |
Title: EMF processing remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28101 CVE-2015-1645 |
Severity: High |
Description: Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability." | ||||
Applies to: |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28116 |
Title: ASP.NET information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28116 CVE-2015-1648 |
Severity: Low |
Description: ASP.NET in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2, when the customErrors configuration is disabled, allows remote attackers to obtain sensitive configuration-file information via a crafted request, aka "ASP.NET Information Disclosure Vulnerability." | ||||
Applies to: Microsoft .NET Framework 1.1 Microsoft .NET Framework 2.0 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.0 Microsoft .NET Framework 4.5 Microsoft .NET Framework 4.5.1 Microsoft .NET Framework 4.5.2 |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: MITRE:28782 |
Title: Active Directory Federation Services information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28782 CVE-2015-1638 |
Severity: Medium |
Description: Microsoft Active Directory Federation Services (AD FS) 3.0 on Windows Server 2012 R2 does not properly handle logoff actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation, aka "Active Directory Federation Services Information Disclosure Vulnerability." | ||||
Applies to: Microsoft Active Directory Federation Services |
Created: 2015-06-01 |
Updated: 2024-09-07 |
ID: CVE-2015-0756 |
Title: Cisco Wireless LAN Controller (WLC) devices with software 7.4(1.1) allow remote attackers to cause a denial of service (wireless-networking outage) via crafted TCP traffic on the local network, aka Bug ID CSCug67104. |
Type: Hardware |
Bulletins:
CVE-2015-0756 |
Severity: Medium |
Description: Cisco Wireless LAN Controller (WLC) devices with software 7.4(1.1) allow remote attackers to cause a denial of service (wireless-networking outage) via crafted TCP traffic on the local network, aka Bug ID CSCug67104. | ||||
Applies to: |
Created: 2015-05-29 |
Updated: 2024-09-07 |
ID: CVE-2015-0751 |
Title: Cisco IP Phone 7861, when firmware from Cisco Unified Communications Manager 10.3(1) is used, allows remote attackers to cause a denial of service via crafted packets, aka Bug ID CSCus81800. |
Type: Hardware |
Bulletins:
CVE-2015-0751 |
Severity: High |
Description: Cisco IP Phone 7861, when firmware from Cisco Unified Communications Manager 10.3(1) is used, allows remote attackers to cause a denial of service via crafted packets, aka Bug ID CSCus81800. | ||||
Applies to: Unified Communications Manager |
Created: 2015-05-29 |
Updated: 2024-09-07 |
ID: CVE-2015-1157 |
Title: CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1157 SFBID75491 |
Severity: High |
Description: CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2) a WhatsApp message. | ||||
Applies to: |
Created: 2015-05-27 |
Updated: 2024-09-07 |
ID: CVE-2015-0723 |
Title: The wireless web-authentication subsystem on Cisco Wireless LAN Controller (WLC) devices 7.5.x and 7.6.x before 7.6.120 allows remote attackers to cause a denial of service (process crash and device restart) via a crafted value, aka Bug ID CSCum03269. |
Type: Hardware |
Bulletins:
CVE-2015-0723 |
Severity: Medium |
Description: The wireless web-authentication subsystem on Cisco Wireless LAN Controller (WLC) devices 7.5.x and 7.6.x before 7.6.120 allows remote attackers to cause a denial of service (process crash and device restart) via a crafted value, aka Bug ID CSCum03269. | ||||
Applies to: |
Created: 2015-05-16 |
Updated: 2024-09-07 |
ID: CVE-2015-0726 |
Title: The web administration interface on Cisco Wireless LAN Controller (WLC) devices before 7.0.241, 7.1.x through 7.4.x before 7.4.122, and 7.5.x and 7.6.x before 7.6.120 allows remote authenticated users to cause a denial of service (device crash) via... |
Type: Hardware |
Bulletins:
CVE-2015-0726 SFBID74641 |
Severity: Medium |
Description: The web administration interface on Cisco Wireless LAN Controller (WLC) devices before 7.0.241, 7.1.x through 7.4.x before 7.4.122, and 7.5.x and 7.6.x before 7.6.120 allows remote authenticated users to cause a denial of service (device crash) via unspecified parameters, aka Bug IDs CSCum65159 and CSCum65252. | ||||
Applies to: |
Created: 2015-05-16 |
Updated: 2024-09-07 |
ID: CVE-2015-0717 |
Title: Cisco Unified Communications Manager 10.0(1.10000.12) allows local users to gain privileges via a command string in an unspecified parameter, aka Bug ID CSCut19546. |
Type: Hardware |
Bulletins:
CVE-2015-0717 |
Severity: Medium |
Description: Cisco Unified Communications Manager 10.0(1.10000.12) allows local users to gain privileges via a command string in an unspecified parameter, aka Bug ID CSCut19546. | ||||
Applies to: Unified Communications Manager |
Created: 2015-05-16 |
Updated: 2024-09-07 |
ID: CVE-2015-0731 |
Title: The ISDN implementation in Cisco IOS 15.3S allows remote attackers to cause a denial of service (device reload) via malformed Q931 SETUP messages, aka Bug ID CSCut37890. |
Type: Hardware |
Bulletins:
CVE-2015-0731 |
Severity: Medium |
Description: The ISDN implementation in Cisco IOS 15.3S allows remote attackers to cause a denial of service (device reload) via malformed Q931 SETUP messages, aka Bug ID CSCut37890. | ||||
Applies to: |
Created: 2015-05-15 |
Updated: 2024-09-07 |
ID: CVE-2015-1152 |
Title: WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1152 SFBID74525 |
Severity: Medium |
Description: WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1153 and CVE-2015-1154. | ||||
Applies to: |
Created: 2015-05-07 |
Updated: 2024-09-07 |
ID: CVE-2015-1153 |
Title: WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1153 SFBID74523 |
Severity: Medium |
Description: WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1154. | ||||
Applies to: |
Created: 2015-05-07 |
Updated: 2024-09-07 |
ID: CVE-2015-1156 |
Title: The page-loading implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, does not properly handle the rel attribute in an A element, which allows remote attackers to bypass the Same... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1156 SFBID74524 |
Severity: Medium |
Description: The page-loading implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, does not properly handle the rel attribute in an A element, which allows remote attackers to bypass the Same Origin Policy for a link's target, and spoof the user interface, via a crafted web site. | ||||
Applies to: |
Created: 2015-05-07 |
Updated: 2024-09-07 |
ID: CVE-2015-1155 |
Title: The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1155 SFBID74527 |
Severity: Medium |
Description: The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site. | ||||
Applies to: |
Created: 2015-05-07 |
Updated: 2024-09-07 |
ID: CVE-2014-8361 |
Title: The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request. |
Type: Hardware |
Bulletins:
CVE-2014-8361 SFBID74330 |
Severity: High |
Description: The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request. | ||||
Applies to: dir-600l dir-605l dir-619l dir-809 dir-905l |
Created: 2015-05-01 |
Updated: 2024-09-07 |
ID: CVE-2015-3447 |
Title: Multiple cross-site scripting (XSS) vulnerabilities in macIpSpoofView.html in Dell SonicWall SonicOS 7.5.0.12 and 6.x allow remote attackers to inject arbitrary web script or HTML via the (1) searchSpoof or (2) searchSpoofIpDet parameter. |
Type: Hardware |
Bulletins:
CVE-2015-3447 SFBID74406 |
Severity: Medium |
Description: Multiple cross-site scripting (XSS) vulnerabilities in macIpSpoofView.html in Dell SonicWall SonicOS 7.5.0.12 and 6.x allow remote attackers to inject arbitrary web script or HTML via the (1) searchSpoof or (2) searchSpoofIpDet parameter. | ||||
Applies to: |
Created: 2015-04-29 |
Updated: 2024-09-07 |
ID: CVE-2015-0710 |
Title: The Overlay Transport Virtualization (OTV) implementation in Cisco IOS XE 3.10S allows remote attackers to cause a denial of service (device reload) via a series of packets that are considered oversized and trigger improper fragmentation handling,... |
Type: Hardware |
Bulletins:
CVE-2015-0710 |
Severity: Medium |
Description: The Overlay Transport Virtualization (OTV) implementation in Cisco IOS XE 3.10S allows remote attackers to cause a denial of service (device reload) via a series of packets that are considered oversized and trigger improper fragmentation handling, aka Bug IDs CSCup37676 and CSCup30335. | ||||
Applies to: |
Created: 2015-04-28 |
Updated: 2024-09-07 |
ID: CVE-2015-0709 |
Title: Cisco IOS 15.5S and IOS XE allow remote authenticated users to cause a denial of service (device crash) by leveraging knowledge of the RADIUS secret and sending crafted RADIUS packets, aka Bug ID CSCur21348. |
Type: Hardware |
Bulletins:
CVE-2015-0709 |
Severity: Medium |
Description: Cisco IOS 15.5S and IOS XE allow remote authenticated users to cause a denial of service (device crash) by leveraging knowledge of the RADIUS secret and sending crafted RADIUS packets, aka Bug ID CSCur21348. | ||||
Applies to: |
Created: 2015-04-28 |
Updated: 2024-09-07 |
ID: CVE-2015-0708 |
Title: Cisco IOS 15.4S, 15.4SN, and 15.5S and IOS XE 3.13S and 3.14S allow remote attackers to cause a denial of service (device crash) by including an IA_NA option in a DHCPv6 Solicit message on the local network, aka Bug ID CSCur29956. |
Type: Hardware |
Bulletins:
CVE-2015-0708 |
Severity: Medium |
Description: Cisco IOS 15.4S, 15.4SN, and 15.5S and IOS XE 3.13S and 3.14S allow remote attackers to cause a denial of service (device crash) by including an IA_NA option in a DHCPv6 Solicit message on the local network, aka Bug ID CSCur29956. | ||||
Applies to: |
Created: 2015-04-28 |
Updated: 2024-09-07 |
ID: MITRE:27987 |
Title: WTS remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:27987 CVE-2015-0081 |
Severity: High |
Description: Windows Text Services (WTS) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "WTS Remote Code Execution Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28813 |
Title: Win32k elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28813 CVE-2015-0078 |
Severity: High |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate the token of a calling thread, which allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28562 |
Title: Vulnerability in Microsoft Schannel could allow security feature bypass |
Type: Software |
Bulletins:
MITRE:28562 CVE-2015-1637 |
Severity: Medium |
Description: Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204 and CVE-2015-1067. | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28797 |
Title: VBScript memory corruption vulnerability |
Type: Miscellaneous |
Bulletins:
MITRE:28797 CVE-2015-0032 |
Severity: High |
Description: vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 8 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 VBScript 5.6 VBScript 5.7 VBScript 5.8 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28780 |
Title: Task scheduler security feature bypass vulnerability |
Type: Software |
Bulletins:
MITRE:28780 CVE-2015-0084 |
Severity: Low |
Description: The Task Scheduler in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly constrain impersonation levels, which allows local users to bypass intended restrictions on launching executable files via a crafted task, aka "Task Scheduler Security Feature Bypass Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28847 |
Title: Remote desktop protocol |
Type: Software |
Bulletins:
MITRE:28847 CVE-2015-0079 |
Severity: High |
Description: The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to cause a denial of service (memory consumption and RDP outage) by establishing many RDP sessions that do not properly free allocated memory, aka "Remote Desktop Protocol (RDP) Denial of Service Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28816 |
Title: Registry virtualization elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28816 CVE-2015-0073 |
Severity: High |
Description: The Windows Registry Virtualization feature in the kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict changes to virtual stores, which allows local users to gain privileges via a crafted application, aka "Registry Virtualization Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28811 |
Title: OWA modified canary parameter cross site scripting vulnerability |
Type: Software |
Bulletins:
MITRE:28811 CVE-2015-1628 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote attackers to inject arbitrary web script or HTML via a crafted X-OWA-Canary cookie in an AD.RecipientType.User action, aka "OWA Modified Canary Parameter Cross Site Scripting Vulnerability." | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28863 |
Title: NETLOGON spoofing vulnerability |
Type: Software |
Bulletins:
MITRE:28863 CVE-2015-0005 |
Severity: Medium |
Description: The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, aka "NETLOGON Spoofing Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28851 |
Title: Microsoft word local zone remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28851 CVE-2015-0097 |
Severity: High |
Description: Microsoft Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Excel 2010 SP2, PowerPoint 2010 SP2, and Word 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Word Local Zone Remote Code Execution Vulnerability." | ||||
Applies to: Microsoft Excel 2007 Microsoft Excel 2010 Microsoft PowerPoint 2007 Microsoft PowerPoint 2010 Microsoft Word 2007 Microsoft Word 2010 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28803 |
Title: Microsoft windows kernel memory disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28803 CVE-2015-0077 |
Severity: Low |
Description: The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly initialize function buffers, which allows local users to obtain sensitive information from kernel memory, and possibly bypass the ASLR protection mechanism, via a crafted application, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28656 |
Title: Microsoft windows kernel memory disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28656 CVE-2015-0094 |
Severity: Low |
Description: The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly restrict the availability of address information during a function call, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28667 |
Title: Microsoft windows kernel memory disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28667 CVE-2015-0095 |
Severity: Medium |
Description: The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to cause a denial of service (NULL pointer dereference and blue screen), or obtain sensitive information from kernel memory and possibly bypass the ASLR protection mechanism, via a crafted application, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:27875 |
Title: Microsoft SharePoint xss vulnerability |
Type: Software |
Bulletins:
MITRE:27875 CVE-2015-1633 |
Severity: Low |
Description: Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, SharePoint Foundation 2013 Gold and SP1, and SharePoint Server 2013 Gold and SP1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted request, aka "Microsoft SharePoint XSS Vulnerability." | ||||
Applies to: Microsoft SharePoint Foundation 2010 Microsoft SharePoint Foundation 2013 Microsoft SharePoint Server 2010 Microsoft SharePoint Server 2013 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28658 |
Title: Microsoft SharePoint xss vulnerability |
Type: Software |
Bulletins:
MITRE:28658 CVE-2015-1636 |
Severity: Low |
Description: Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Foundation 2013 Gold and SP1 and SharePoint Server 2013 Gold and SP1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted request, aka "Microsoft SharePoint XSS Vulnerability." | ||||
Applies to: Microsoft SharePoint Foundation 2013 Microsoft SharePoint Server 2013 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28356 |
Title: Microsoft office memory corruption vulnerability |
Type: Miscellaneous |
Bulletins:
MITRE:28356 CVE-2015-0086 |
Severity: High |
Description: Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 Gold and SP1, Word 2013 RT Gold and SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, and Web Apps Server 2013 Gold and SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Office 2010 Microsoft Office Compatibility Pack Microsoft Office Web Apps 2010 Microsoft Office Web Apps Server 2013 Microsoft SharePoint Server 2010 Microsoft SharePoint Server 2013 Microsoft Word 2007 Microsoft Word 2010 Microsoft Word... |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28631 |
Title: Microsoft office component use after free vulnerability |
Type: Software |
Bulletins:
MITRE:28631 CVE-2015-0085 |
Severity: High |
Description: Use-after-free vulnerability in Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold and SP1, Word 2013 Gold and SP1, Office 2013 RT Gold and SP1, Word 2013 RT Gold and SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on SharePoint Server 2013 Gold and SP1, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, Office Web Apps Server 2010 SP2, Web Apps Server 2013 Gold and SP1, SharePoint Server 2007 SP3, Windows SharePoint Services 3.0 SP3, SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, SharePoint Foundation 2013 Gold and SP1, and SharePoint Server 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." | ||||
Applies to: Microsoft Excel 2007 Microsoft Excel 2010 Microsoft Excel Viewer 2007 Microsoft Office 2007 Microsoft Office 2010 Microsoft Office 2013 Microsoft Office Compatibility Pack Microsoft Office Web Apps 2010 Microsoft Office Web Apps Server 2013 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28428 |
Title: Malformed PNG parsing information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28428 CVE-2015-0080 |
Severity: Medium |
Description: Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly initialize memory for rendering of malformed PNG images, which allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Malformed PNG Parsing Information Disclosure Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28675 |
Title: JPEG XR parser information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28675 CVE-2015-0076 |
Severity: Medium |
Description: The photo-decoder implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly initialize memory for rendering of JXR images, which allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "JPEG XR Parser Information Disclosure Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28836 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28836 CVE-2015-0100 |
Severity: High |
Description: Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 8 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28843 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28843 CVE-2015-1624 |
Severity: High |
Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28464 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28464 CVE-2015-0099 |
Severity: High |
Description: Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28487 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28487 CVE-2015-1625 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1634. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28569 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28569 CVE-2015-1634 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1625. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28670 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28670 CVE-2015-1623 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0056 and CVE-2015-1626. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28757 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28757 CVE-2015-1622 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28768 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28768 CVE-2015-0056 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1623 and CVE-2015-1626. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28781 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28781 CVE-2015-1626 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0056 and CVE-2015-1623. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28605 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Web |
Bulletins:
MITRE:28605 CVE-2015-1627 |
Severity: Medium |
Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28737 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28737 CVE-2015-0072 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy and inject arbitrary web script or HTML via vectors involving an IFRAME element that triggers a redirect, a second IFRAME element that does not trigger a redirect, and an eval of a WindowProxy object, aka "Universal XSS (UXSS)." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28844 |
Title: Impersonation level check elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28844 CVE-2015-0075 |
Severity: High |
Description: The kernel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Impersonation Level Check Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28748 |
Title: ExchangeDLP cross site scripting vulnerability |
Type: Software |
Bulletins:
MITRE:28748 CVE-2015-1629 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "ExchangeDLP Cross Site Scripting Vulnerability." | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28294 |
Title: Exchange forged meeting request spoofing vulnerability |
Type: Software |
Bulletins:
MITRE:28294 CVE-2015-1631 |
Severity: Medium |
Description: Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote attackers to spoof meeting organizers via unspecified vectors, aka "Exchange Forged Meeting Request Spoofing Vulnerability." | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:27900 |
Title: Exchange error message cross site scripting vulnerability |
Type: Software |
Bulletins:
MITRE:27900 CVE-2015-1632 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in errorfe.aspx in Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote attackers to inject arbitrary web script or HTML via the msgParam parameter in an authError action, aka "Exchange Error Message Cross Site Scripting Vulnerability." | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28609 |
Title: DLL planting remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28609 CVE-2015-0096 |
Severity: High |
Description: Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, leading to DLL loading during Windows Explorer access to the icon of a crafted shortcut, aka "DLL Planting Remote Code Execution Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28524 |
Title: Audit report cross site scripting vulnerability |
Type: Software |
Bulletins:
MITRE:28524 CVE-2015-1630 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Audit Report Cross Site Scripting Vulnerability." | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28807 |
Title: Adobe font driver remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28807 CVE-2015-0088 |
Severity: High |
Description: Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "Adobe Font Driver Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-0090, CVE-2015-0091, CVE-2015-0092, and CVE-2015-0093. | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28684 |
Title: Adobe font driver remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28684 CVE-2015-0091 |
Severity: High |
Description: Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "Adobe Font Driver Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-0088, CVE-2015-0090, CVE-2015-0092, and CVE-2015-0093. | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28738 |
Title: Adobe font driver remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28738 CVE-2015-0093 |
Severity: High |
Description: Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "Adobe Font Driver Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-0088, CVE-2015-0090, CVE-2015-0091, and CVE-2015-0092. | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28770 |
Title: Adobe font driver remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28770 CVE-2015-0090 |
Severity: High |
Description: Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "Adobe Font Driver Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-0088, CVE-2015-0091, CVE-2015-0092, and CVE-2015-0093. | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28771 |
Title: Adobe font driver remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28771 CVE-2015-0092 |
Severity: High |
Description: Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "Adobe Font Driver Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-0088, CVE-2015-0090, CVE-2015-0091, and CVE-2015-0093. | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28469 |
Title: Adobe font driver information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28469 CVE-2015-0087 |
Severity: Medium |
Description: Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to obtain sensitive information from kernel memory, and possibly bypass the KASLR protection mechanism, via a crafted font, aka "Adobe Font Driver Information Disclosure Vulnerability," a different vulnerability than CVE-2015-0089. | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28549 |
Title: Adobe font driver information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28549 CVE-2015-0089 |
Severity: Medium |
Description: Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to obtain sensitive information from kernel memory, and possibly bypass the KASLR protection mechanism, via a crafted font, aka "Adobe Font Driver Information Disclosure Vulnerability," a different vulnerability than CVE-2015-0087. | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: MITRE:28730 |
Title: Adobe font driver denial of service vulnerability |
Type: Software |
Bulletins:
MITRE:28730 CVE-2015-0074 |
Severity: Medium |
Description: Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly allocate memory, which allows remote attackers to cause a denial of service via a crafted (1) web site or (2) file, aka "Adobe Font Driver Denial of Service Vulnerability." | ||||
Applies to: |
Created: 2015-04-27 |
Updated: 2024-09-07 |
ID: CVE-2015-0695 |
Title: Cisco IOS XR 4.3.4 through 5.3.0 on ASR 9000 devices, when uRPF, PBR, QoS, or an ACL is configured, does not properly handle bridge-group virtual interface (BVI) traffic, which allows remote attackers to cause a denial of service (chip and card... |
Type: Hardware |
Bulletins:
CVE-2015-0695 SFBID74162 |
Severity: High |
Description: Cisco IOS XR 4.3.4 through 5.3.0 on ASR 9000 devices, when uRPF, PBR, QoS, or an ACL is configured, does not properly handle bridge-group virtual interface (BVI) traffic, which allows remote attackers to cause a denial of service (chip and card hangs and reloads) by triggering use of a BVI interface for IPv4 packets, aka Bug ID CSCur62957. | ||||
Applies to: |
Created: 2015-04-16 |
Updated: 2024-09-07 |
ID: CVE-2015-1126 |
Title: WebKit, as used in Apple iOS before 8.3 and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, does not properly handle the userinfo field in FTP URLs, which allows remote attackers to trigger incorrect resource... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1126 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.3 and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, does not properly handle the userinfo field in FTP URLs, which allows remote attackers to trigger incorrect resource access via unspecified vectors. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1116 |
Title: The UIKit View component in Apple iOS before 8.3 displays unblurred application snapshots in the Task Switcher, which makes it easier for physically proximate attackers to obtain sensitive information by reading the device screen. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1116 SFBID73978 |
Severity: Low |
Description: The UIKit View component in Apple iOS before 8.3 displays unblurred application snapshots in the Task Switcher, which makes it easier for physically proximate attackers to obtain sensitive information by reading the device screen. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1125 |
Title: The touch-events implementation in WebKit in Apple iOS before 8.3 allows remote attackers to trigger an association between a tap and an unintended web resource via a crafted web site. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1125 |
Severity: Medium |
Description: The touch-events implementation in WebKit in Apple iOS before 8.3 allows remote attackers to trigger an association between a tap and an unintended web resource via a crafted web site. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1115 |
Title: The Telephony component in Apple iOS before 8.3 allows attackers to bypass a sandbox protection mechanism and access unintended telephone capabilities via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1115 SFBID73978 |
Severity: Medium |
Description: The Telephony component in Apple iOS before 8.3 allows attackers to bypass a sandbox protection mechanism and access unintended telephone capabilities via a crafted app. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1113 |
Title: The Sandbox Profiles component in Apple iOS before 8.3 allows attackers to read the (1) telephone number or (2) e-mail address of a recent contact via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1113 SFBID73978 |
Severity: Low |
Description: The Sandbox Profiles component in Apple iOS before 8.3 allows attackers to read the (1) telephone number or (2) e-mail address of a recent contact via a crafted app. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1106 |
Title: The QuickType feature in the Keyboards subsystem in Apple iOS before 8.3 allows physically proximate attackers to discover passcodes by reading the lock screen during use of a Bluetooth keyboard. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1106 SFBID73978 |
Severity: Low |
Description: The QuickType feature in the Keyboards subsystem in Apple iOS before 8.3 allows physically proximate attackers to discover passcodes by reading the lock screen during use of a Bluetooth keyboard. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1107 |
Title: The Lock Screen component in Apple iOS before 8.3 does not properly implement the erasure feature for incorrect passcode-authentication attempts, which makes it easier for physically proximate attackers to obtain access by making... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1107 SFBID73978 |
Severity: Low |
Description: The Lock Screen component in Apple iOS before 8.3 does not properly implement the erasure feature for incorrect passcode-authentication attempts, which makes it easier for physically proximate attackers to obtain access by making many passcode guesses. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1108 |
Title: The Lock Screen component in Apple iOS before 8.3 does not properly enforce the limit on incorrect passcode-authentication attempts, which makes it easier for physically proximate attackers to obtain access by making many passcode guesses. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1108 SFBID73978 |
Severity: Low |
Description: The Lock Screen component in Apple iOS before 8.3 does not properly enforce the limit on incorrect passcode-authentication attempts, which makes it easier for physically proximate attackers to obtain access by making many passcode guesses. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1091 |
Title: The CFNetwork Session component in Apple iOS before 8.3 and Apple OS X before 10.10.3 does not properly handle request headers during processing of redirects in HTTP responses, which allows remote attackers to bypass the Same Origin... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1091 SFBID73984 |
Severity: Medium |
Description: The CFNetwork Session component in Apple iOS before 8.3 and Apple OS X before 10.10.3 does not properly handle request headers during processing of redirects in HTTP responses, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1111 |
Title: Safari in Apple iOS before 8.3 does not delete Recently Closed Tabs data in response to a history-clearing action, which allows attackers to obtain sensitive information by reading a history file. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1111 SFBID73978 |
Severity: Medium |
Description: Safari in Apple iOS before 8.3 does not delete Recently Closed Tabs data in response to a history-clearing action, which allows attackers to obtain sensitive information by reading a history file. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1109 |
Title: NetworkExtension in Apple iOS before 8.3 stores credentials in VPN configuration logs, which makes it easier for physically proximate attackers to obtain sensitive information by reading a log file. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1109 SFBID73978 |
Severity: Low |
Description: NetworkExtension in Apple iOS before 8.3 stores credentials in VPN configuration logs, which makes it easier for physically proximate attackers to obtain sensitive information by reading a log file. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-3003 |
Title: Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D20, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3, and 14.2 before 14.2R1 allows local users... |
Type: Hardware |
Bulletins:
CVE-2015-3003 SFBID74023 |
Severity: High |
Description: Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D20, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3, and 14.2 before 14.2R1 allows local users to gain privileges via crafted combinations of CLI commands and arguments. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-3002 |
Title: Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D15, and 12.3X48 before 12.3X48-D10 on SRX series devices does not properly enforce the log-out-on-disconnect feature when configured in the [system port... |
Type: Hardware |
Bulletins:
CVE-2015-3002 SFBID74019 |
Severity: Medium |
Description: Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D15, and 12.3X48 before 12.3X48-D10 on SRX series devices does not properly enforce the log-out-on-disconnect feature when configured in the [system port console] stanza, which allows physically proximate attackers to reconnect to the console port and gain administrative access by leveraging access to the device. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-3004 |
Title: J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3... |
Type: Hardware |
Bulletins:
CVE-2015-3004 SFBID74017 |
Severity: Medium |
Description: J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1098 |
Title: iWork in Apple iOS before 8.3 and Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted iWork file. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1098 SFBID73984 |
Severity: Medium |
Description: iWork in Apple iOS before 8.3 and Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted iWork file. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1093 |
Title: FontParser in Apple iOS before 8.3 and Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1093 SFBID73984 |
Severity: Medium |
Description: FontParser in Apple iOS before 8.3 and Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1087 |
Title: Directory traversal vulnerability in Backup in Apple iOS before 8.3 allows attackers to read arbitrary files via a crafted relative path. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1087 SFBID73978 |
Severity: Low |
Description: Directory traversal vulnerability in Backup in Apple iOS before 8.3 allows attackers to read arbitrary files via a crafted relative path. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-3005 |
Title: Cross-site scripting (XSS) vulnerability in the Dynamic VPN in Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D20, and 12.3X48 before 12.3X48-D10 on SRX series devices allows remote attackers to inject... |
Type: Hardware |
Bulletins:
CVE-2015-3005 SFBID74016 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in the Dynamic VPN in Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D20, and 12.3X48 before 12.3X48-D10 on SRX series devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1088 |
Title: CFURL in Apple iOS before 8.3 and Apple OS X before 10.10.3 does not properly validate URLs, which allows remote attackers to execute arbitrary code via a crafted web site. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1088 SFBID73984 |
Severity: Medium |
Description: CFURL in Apple iOS before 8.3 and Apple OS X before 10.10.3 does not properly validate URLs, which allows remote attackers to execute arbitrary code via a crafted web site. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1090 |
Title: CFNetwork in Apple iOS before 8.3 does not delete HTTP Strict Transport Security (HSTS) state information in response to a Safari history-clearing action, which allows attackers to obtain sensitive information by reading a history file. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1090 SFBID73978 |
Severity: Medium |
Description: CFNetwork in Apple iOS before 8.3 does not delete HTTP Strict Transport Security (HSTS) state information in response to a Safari history-clearing action, which allows attackers to obtain sensitive information by reading a history file. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1089 |
Title: CFNetwork in Apple iOS before 8.3 and Apple OS X before 10.10.3 does not properly handle cookies during processing of redirects in HTTP responses, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1089 SFBID73984 |
Severity: Medium |
Description: CFNetwork in Apple iOS before 8.3 and Apple OS X before 10.10.3 does not properly handle cookies during processing of redirects in HTTP responses, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1085 |
Title: AppleKeyStore in Apple iOS before 8.3 does not properly restrict a certain passcode-confirmation interface, which makes it easier for attackers to verify correct passcode guesses via a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1085 SFBID73978 |
Severity: Low |
Description: AppleKeyStore in Apple iOS before 8.3 does not properly restrict a certain passcode-confirmation interface, which makes it easier for attackers to verify correct passcode guesses via a crafted app. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1112 |
Title: Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, as used on iOS before 8.3 and other platforms, does not properly delete browsing-history data from the history.plist file, which allows attackers to obtain sensitive... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1112 |
Severity: Medium |
Description: Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, as used on iOS before 8.3 and other platforms, does not properly delete browsing-history data from the history.plist file, which allows attackers to obtain sensitive information by reading this file. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-1129 |
Title: Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 does not properly select X.509 client certificates, which makes it easier for remote attackers to track users via a crafted web site. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1129 |
Severity: Medium |
Description: Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 does not properly select X.509 client certificates, which makes it easier for remote attackers to track users via a crafted web site. | ||||
Applies to: |
Created: 2015-04-10 |
Updated: 2024-09-07 |
ID: CVE-2015-0690 |
Title: Cross-site scripting (XSS) vulnerability in the HTML help system on Cisco Wireless LAN Controller (WLC) devices before 8.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCun95178. |
Type: Hardware |
Bulletins:
CVE-2015-0690 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in the HTML help system on Cisco Wireless LAN Controller (WLC) devices before 8.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCun95178. | ||||
Applies to: |
Created: 2015-04-06 |
Updated: 2024-09-07 |
ID: CVE-2015-0688 |
Title: Cisco IOS XE 3.10.2S on an ASR 1000 device with an Embedded Services Processor (ESP) module, when NAT is enabled, allows remote attackers to cause a denial of service (module crash) via malformed H.323 packets, aka Bug ID CSCup21070. |
Type: Hardware |
Bulletins:
CVE-2015-0688 |
Severity: High |
Description: Cisco IOS XE 3.10.2S on an ASR 1000 device with an Embedded Services Processor (ESP) module, when NAT is enabled, allows remote attackers to cause a denial of service (module crash) via malformed H.323 packets, aka Bug ID CSCup21070. | ||||
Applies to: |
Created: 2015-04-03 |
Updated: 2024-09-07 |
ID: CVE-2015-0686 |
Title: The SNMP implementation in Cisco NX-OS 6.1(2)I2(3) on Nexus 9000 devices, when a Reset High Availability (HA) policy is configured, allows remote authenticated users to cause a denial of service (device reload) via unspecified vectors, aka Bug ID... |
Type: Hardware |
Bulletins:
CVE-2015-0686 |
Severity: Medium |
Description: The SNMP implementation in Cisco NX-OS 6.1(2)I2(3) on Nexus 9000 devices, when a Reset High Availability (HA) policy is configured, allows remote authenticated users to cause a denial of service (device reload) via unspecified vectors, aka Bug ID CSCuq92240. | ||||
Applies to: |
Created: 2015-04-02 |
Updated: 2024-09-07 |
ID: CVE-2015-0687 |
Title: The SNMP implementation in Cisco IOS 15.1(2)SG4 on Catalyst 4500 devices, when single-switch Virtual Switching System (VSS) is configured, allows remote authenticated users to cause a denial of service (device crash) by performing SNMP polling, aka... |
Type: Hardware |
Bulletins:
CVE-2015-0687 |
Severity: Medium |
Description: The SNMP implementation in Cisco IOS 15.1(2)SG4 on Catalyst 4500 devices, when single-switch Virtual Switching System (VSS) is configured, allows remote authenticated users to cause a denial of service (device crash) by performing SNMP polling, aka Bug ID CSCuq04574. | ||||
Applies to: |
Created: 2015-04-02 |
Updated: 2024-09-07 |
ID: CVE-2015-0685 |
Title: Cisco IOS XE before 3.7.5S on ASR 1000 devices does not properly handle route adjacencies, which allows remote attackers to cause a denial of service (device hang) via crafted IP packets, aka Bug ID CSCub31873. |
Type: Hardware |
Bulletins:
CVE-2015-0685 |
Severity: High |
Description: Cisco IOS XE before 3.7.5S on ASR 1000 devices does not properly handle route adjacencies, which allows remote attackers to cause a denial of service (device hang) via crafted IP packets, aka Bug ID CSCub31873. | ||||
Applies to: |
Created: 2015-04-02 |
Updated: 2024-09-07 |
ID: MITRE:28688 |
Title: Windows font driver denial of service vulnerability |
Type: Software |
Bulletins:
MITRE:28688 CVE-2015-0060 |
Severity: Medium |
Description: The font mapper in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly scale fonts, which allows local users to cause a denial of service (system hang) via a crafted application, aka "Windows Font Driver Denial of Service Vulnerability." | ||||
Applies to: |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28764 |
Title: Windows create process elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28764 CVE-2015-0062 |
Severity: High |
Description: Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to gain privileges via a crafted application that leverages incorrect impersonation handling in a process that uses the SeAssignPrimaryTokenPrivilege privilege, aka "Windows Create Process Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28689 |
Title: Win32k elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28689 CVE-2015-0057 |
Severity: High |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28633 |
Title: TrueType font parsing remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28633 CVE-2015-0059 |
Severity: Medium |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted TrueType font, aka "TrueType Font Parsing Remote Code Execution Vulnerability." | ||||
Applies to: |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28731 |
Title: TIFF Processing information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28731 CVE-2015-0061 |
Severity: Medium |
Description: Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly initialize memory for TIFF images, which allows remote attackers to obtain sensitive information from process memory via a crafted image file, aka "TIFF Processing Information Disclosure Vulnerability." | ||||
Applies to: |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28598 |
Title: OneTableDocumentStream remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28598 CVE-2015-0065 |
Severity: High |
Description: Microsoft Word 2007 SP3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "OneTableDocumentStream Remote Code Execution Vulnerability." | ||||
Applies to: Microsoft Word 2007 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28074 |
Title: Office remote code execution vulnerability |
Type: Miscellaneous |
Bulletins:
MITRE:28074 CVE-2015-0064 |
Severity: High |
Description: Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Automation Services in SharePoint Server 2010, Web Applications 2010 SP2, Word Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Office Remote Code Execution Vulnerability." | ||||
Applies to: Microsoft Office Compatibility Pack Microsoft Office Web Apps 2010 Microsoft SharePoint Server 2010 Microsoft Word 2007 Microsoft Word 2010 Microsoft Word Viewer |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:27780 |
Title: Microsoft schannel remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:27780 CVE-2015-0058 |
Severity: High |
Description: Double free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 allows local users to gain privileges via a crafted application, aka "Windows Cursor Object Double Free Vulnerability." | ||||
Applies to: |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28762 |
Title: Microsoft schannel remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28762 CVE-2015-0003 |
Severity: Medium |
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (NULL pointer dereference) via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28668 |
Title: Microsoft Office component use after free vulnerability |
Type: Software |
Bulletins:
MITRE:28668 CVE-2014-6362 |
Severity: Medium |
Description: Use-after-free vulnerability in Microsoft Office 2007 SP3, 2010 SP2, and 2013 Gold and SP1 allows remote attackers to bypass the ASLR protection mechanism via a crafted document, aka "Microsoft Office Component Use After Free Vulnerability." | ||||
Applies to: Microsoft Office 2007 Microsoft Office 2010 Microsoft Office 2013 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28548 |
Title: Internet Explorer use-after-free vulnerability |
Type: Web |
Bulletins:
MITRE:28548 CVE-2014-8967 |
Severity: Medium |
Description: Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted HTML document in conjunction with a Cascading Style Sheets (CSS) token sequence specifying the run-in value for the display property, leading to improper CElement reference counting. | ||||
Applies to: Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:27765 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:27765 CVE-2015-0029 |
Severity: High |
Description: Microsoft Internet Explorer 6 and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 6 Microsoft Internet Explorer 8 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:27772 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:27772 CVE-2015-0067 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:27957 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:27957 CVE-2015-0042 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0038 and CVE-2015-0046. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:27977 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:27977 CVE-2015-0041 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0020, CVE-2015-0022, CVE-2015-0026, CVE-2015-0030, CVE-2015-0031, and CVE-2015-0036. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28021 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28021 CVE-2015-0050 |
Severity: High |
Description: Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-8967 and CVE-2015-0044. | ||||
Applies to: Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28475 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28475 CVE-2015-0035 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0027, CVE-2015-0039, CVE-2015-0052, and CVE-2015-0068. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28522 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28522 CVE-2015-0046 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0038 and CVE-2015-0042. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28540 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28540 CVE-2015-0021 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28558 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28558 CVE-2015-0026 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0020, CVE-2015-0022, CVE-2015-0030, CVE-2015-0031, CVE-2015-0036, and CVE-2015-0041. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28573 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28573 CVE-2015-0043 |
Severity: High |
Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28590 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28590 CVE-2015-0048 |
Severity: High |
Description: Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0028. | ||||
Applies to: Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28639 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28639 CVE-2015-0040 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0018, CVE-2015-0037, and CVE-2015-0066. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28653 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28653 CVE-2015-0031 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0020, CVE-2015-0022, CVE-2015-0026, CVE-2015-0030, CVE-2015-0036, and CVE-2015-0041. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28663 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28663 CVE-2015-0066 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0018, CVE-2015-0037, and CVE-2015-0040. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28666 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28666 CVE-2015-0019 |
Severity: High |
Description: Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28683 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28683 CVE-2015-0052 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0027, CVE-2015-0035, CVE-2015-0039, and CVE-2015-0068. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28691 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28691 CVE-2015-0045 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0053. | ||||
Applies to: Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28695 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28695 CVE-2015-0049 |
Severity: High |
Description: Microsoft Internet Explorer 8 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 8 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28711 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28711 CVE-2015-0020 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0022, CVE-2015-0026, CVE-2015-0030, CVE-2015-0031, CVE-2015-0036, and CVE-2015-0041. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28714 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28714 CVE-2015-0025 |
Severity: High |
Description: Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0023. | ||||
Applies to: Microsoft Internet Explorer 10 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28718 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28718 CVE-2015-0022 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0020, CVE-2015-0026, CVE-2015-0030, CVE-2015-0031, CVE-2015-0036, and CVE-2015-0041. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28732 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28732 CVE-2015-0039 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0027, CVE-2015-0035, CVE-2015-0052, and CVE-2015-0068. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28735 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28735 CVE-2015-0044 |
Severity: High |
Description: Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-8967 and CVE-2015-0050. | ||||
Applies to: Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28750 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28750 CVE-2015-0038 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0042 and CVE-2015-0046. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28337 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28337 CVE-2015-0017 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0020, CVE-2015-0022, CVE-2015-0026, CVE-2015-0030, CVE-2015-0031, CVE-2015-0036, and CVE-2015-0041. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28347 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28347 CVE-2015-0027 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0035, CVE-2015-0039, CVE-2015-0052, and CVE-2015-0068. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28272 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28272 CVE-2015-0068 |
Severity: High |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0027, CVE-2015-0035, CVE-2015-0039, and CVE-2015-0052. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28382 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28382 CVE-2015-0053 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0045. | ||||
Applies to: Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28383 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28383 CVE-2015-0030 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0020, CVE-2015-0022, CVE-2015-0026, CVE-2015-0031, CVE-2015-0036, and CVE-2015-0041. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28384 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28384 CVE-2015-0018 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0037, CVE-2015-0040, and CVE-2015-0066. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28394 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28394 CVE-2015-0028 |
Severity: High |
Description: Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0048. | ||||
Applies to: Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28395 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28395 CVE-2015-0023 |
Severity: High |
Description: Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0025. | ||||
Applies to: Microsoft Internet Explorer 10 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28402 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28402 CVE-2015-0037 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0018, CVE-2015-0040, and CVE-2015-0066. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28413 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28413 CVE-2015-0036 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0020, CVE-2015-0022, CVE-2015-0026, CVE-2015-0030, CVE-2015-0031, and CVE-2015-0041. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28728 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28728 CVE-2015-0055 |
Severity: Medium |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28193 |
Title: Internet Explorer elevation of privilege vulnerability |
Type: Web |
Bulletins:
MITRE:28193 CVE-2015-0054 |
Severity: Medium |
Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28018 |
Title: Internet Explorer cross-domain information disclosure vulnerability |
Type: Web |
Bulletins:
MITRE:28018 CVE-2015-0070 |
Severity: Medium |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Internet Explorer Cross-domain Information Disclosure Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28449 |
Title: Internet Explorer ASLR bypass vulnerability |
Type: Software |
Bulletins:
MITRE:28449 CVE-2015-0069 |
Severity: Medium |
Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28486 |
Title: Internet Explorer ASLR bypass vulnerability |
Type: Web |
Bulletins:
MITRE:28486 CVE-2015-0051 |
Severity: Medium |
Description: Microsoft Internet Explorer 8 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 8 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28257 |
Title: Internet Explorer ASLR bypass vulnerability |
Type: Software |
Bulletins:
MITRE:28257 CVE-2015-0071 |
Severity: Medium |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28767 |
Title: Group Policy security feature bypass vulnerability |
Type: Software |
Bulletins:
MITRE:28767 CVE-2015-0009 |
Severity: Low |
Description: The Group Policy Security Configuration policy implementation in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows man-in-the-middle attackers to disable a signing requirement and trigger a revert-to-default action by spoofing domain-controller responses, aka "Group Policy Security Feature Bypass Vulnerability." | ||||
Applies to: |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28700 |
Title: Group Policy remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28700 CVE-2015-0008 |
Severity: High |
Description: The UNC implementation in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not include authentication from the server to the client, which allows remote attackers to execute arbitrary code by making crafted data available on a UNC share, as demonstrated by Group Policy data from a spoofed domain controller, aka "Group Policy Remote Code Execution Vulnerability." | ||||
Applies to: |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28604 |
Title: Excel remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:28604 CVE-2015-0063 |
Severity: High |
Description: Microsoft Excel 2007 SP3; the proofing tools in Office 2010 SP2; Excel 2010 SP2; Excel 2013 Gold, SP1, and RT; Excel Viewer; and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Excel Remote Code Execution Vulnerability." | ||||
Applies to: Microsoft Excel 2007 Microsoft Excel 2010 Microsoft Excel 2013 Microsoft Excel Viewer 2007 Microsoft Office Compatibility Pack |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: MITRE:28202 |
Title: CNG security feature bypass vulnerability |
Type: Software |
Bulletins:
MITRE:28202 CVE-2015-0010 |
Severity: Low |
Description: The CryptProtectMemory function in cng.sys (aka the Cryptography Next Generation driver) in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1, when the CRYPTPROTECTMEMORY_SAME_LOGON option is used, does not check an impersonation token's level, which allows local users to bypass intended decryption restrictions by leveraging a service that (1) has a named-pipe planting vulnerability or (2) uses world-readable shared memory for encrypted data, aka "CNG Security Feature Bypass Vulnerability" or MSRC ID 20707. | ||||
Applies to: |
Created: 2015-03-30 |
Updated: 2024-09-07 |
ID: CVE-2015-0679 |
Title: The web-authentication functionality on Cisco Wireless LAN Controller (WLC) devices 7.3(103.8) and 7.4(110.0) allows remote attackers to cause a denial of service (device reload) via a malformed password, aka Bug ID CSCui57980. |
Type: Hardware |
Bulletins:
CVE-2015-0679 |
Severity: Medium |
Description: The web-authentication functionality on Cisco Wireless LAN Controller (WLC) devices 7.3(103.8) and 7.4(110.0) allows remote attackers to cause a denial of service (device reload) via a malformed password, aka Bug ID CSCui57980. | ||||
Applies to: |
Created: 2015-03-27 |
Updated: 2024-09-07 |
ID: CVE-2015-0658 |
Title: The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on... |
Type: Hardware |
Bulletins:
CVE-2015-0658 |
Severity: High |
Description: The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589. | ||||
Applies to: |
Created: 2015-03-27 |
Updated: 2024-09-07 |
ID: CVE-2015-0680 |
Title: Cisco Unified Call Manager (CM) 9.1(2.1000.28) does not properly restrict resource requests, which allows remote authenticated users to read arbitrary files via unspecified vectors, aka Bug ID CSCuq44439. |
Type: Hardware |
Bulletins:
CVE-2015-0680 |
Severity: Medium |
Description: Cisco Unified Call Manager (CM) 9.1(2.1000.28) does not properly restrict resource requests, which allows remote authenticated users to read arbitrary files via unspecified vectors, aka Bug ID CSCuq44439. | ||||
Applies to: Unified Callmanager |
Created: 2015-03-27 |
Updated: 2024-09-07 |
ID: CVE-2015-0650 |
Title: The Service Discovery Gateway (aka mDNS Gateway) in Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 3.9.xS and 3.10.xS before 3.10.4S, 3.11.xS before 3.11.3S, 3.12.xS before 3.12.2S, and 3.13.xS before 3.13.1S allows remote... |
Type: Hardware |
Bulletins:
CVE-2015-0650 |
Severity: High |
Description: The Service Discovery Gateway (aka mDNS Gateway) in Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 3.9.xS and 3.10.xS before 3.10.4S, 3.11.xS before 3.11.3S, 3.12.xS before 3.12.2S, and 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (device reload) by sending malformed mDNS UDP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCup70579. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0645 |
Title: The Layer 4 Redirect (L4R) feature in Cisco IOS XE 2.x and 3.x before 3.10.4S, 3.11 before 3.11.3S, 3.12 before 3.12.2S, 3.13 before 3.13.1S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device... |
Type: Hardware |
Bulletins:
CVE-2015-0645 |
Severity: High |
Description: The Layer 4 Redirect (L4R) feature in Cisco IOS XE 2.x and 3.x before 3.10.4S, 3.11 before 3.11.3S, 3.12 before 3.12.2S, 3.13 before 3.13.1S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device reload) via malformed (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCuq59131. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0640 |
Title: The high-speed logging (HSL) feature in Cisco IOS XE 2.x and 3.x before 3.10.4S, 3.11 before 3.11.3S, 3.12 before 3.12.1S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device... |
Type: Hardware |
Bulletins:
CVE-2015-0640 |
Severity: High |
Description: The high-speed logging (HSL) feature in Cisco IOS XE 2.x and 3.x before 3.10.4S, 3.11 before 3.11.3S, 3.12 before 3.12.1S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device reload) via large IP packets that require NAT and HSL processing after fragmentation, aka Bug ID CSCuo25741. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0672 |
Title: The DHCPv4 server in Cisco IOS XR 5.2.2 on ASR 9000 devices allows remote attackers to cause a denial of service (service outage) via a flood of crafted DHCP packets, aka Bug ID CSCup67822. |
Type: Hardware |
Bulletins:
CVE-2015-0672 |
Severity: Medium |
Description: The DHCPv4 server in Cisco IOS XR 5.2.2 on ASR 9000 devices allows remote attackers to cause a denial of service (service outage) via a flood of crafted DHCP packets, aka Bug ID CSCup67822. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0639 |
Title: The Common Flow Table (CFT) feature in Cisco IOS XE 3.6 and 3.7 before 3.7.1S, 3.8 before 3.8.0S, 3.9 before 3.9.0S, 3.10 before 3.10.0S, 3.11 before 3.11.0S, 3.12 before 3.12.0S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S,... |
Type: Hardware |
Bulletins:
CVE-2015-0639 |
Severity: High |
Description: The Common Flow Table (CFT) feature in Cisco IOS XE 3.6 and 3.7 before 3.7.1S, 3.8 before 3.8.0S, 3.9 before 3.9.0S, 3.10 before 3.10.0S, 3.11 before 3.11.0S, 3.12 before 3.12.0S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S, when MMON or NBAR is enabled, allows remote attackers to cause a denial of service (device reload) via malformed IPv6 packets with IPv4 UDP encapsulation, aka Bug ID CSCua79665. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0635 |
Title: The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to spoof Autonomic Networking Registration Authority (ANRA)... |
Type: Hardware |
Bulletins:
CVE-2015-0635 |
Severity: High |
Description: The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to spoof Autonomic Networking Registration Authority (ANRA) responses, and consequently bypass intended device and node access restrictions or cause a denial of service (disrupted domain access), via crafted AN messages, aka Bug ID CSCup62191. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0636 |
Title: The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (disrupted domain access) via... |
Type: Hardware |
Bulletins:
CVE-2015-0636 |
Severity: High |
Description: The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (disrupted domain access) via spoofed AN messages that reset a finite state machine, aka Bug ID CSCup62293. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0637 |
Title: The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (device reload) via spoofed AN... |
Type: Hardware |
Bulletins:
CVE-2015-0637 |
Severity: High |
Description: The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (device reload) via spoofed AN messages, aka Bug ID CSCup62315. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0646 |
Title: Memory leak in the TCP input module in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.3.xXO, 3.5.xE, 3.6.xE, 3.8.xS through 3.10.xS before 3.10.5S, and 3.11.xS and 3.12.xS before 3.12.3S allows remote attackers to cause a denial of... |
Type: Hardware |
Bulletins:
CVE-2015-0646 SFBID73340 |
Severity: High |
Description: Memory leak in the TCP input module in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.3.xXO, 3.5.xE, 3.6.xE, 3.8.xS through 3.10.xS before 3.10.5S, and 3.11.xS and 3.12.xS before 3.12.3S allows remote attackers to cause a denial of service (memory consumption or device reload) by sending crafted TCP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCum94811. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0648 |
Title: Memory leak in Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (memory consumption) via crafted Common Industrial Protocol (CIP) TCP packets, aka Bug ID CSCun49658. |
Type: Hardware |
Bulletins:
CVE-2015-0648 |
Severity: High |
Description: Memory leak in Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (memory consumption) via crafted Common Industrial Protocol (CIP) TCP packets, aka Bug ID CSCun49658. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0641 |
Title: Cisco IOS XE 2.x and 3.x before 3.9.0S, 3.10 before 3.10.0S, 3.11 before 3.11.0S, 3.12 before 3.12.0S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device reload) via crafted... |
Type: Hardware |
Bulletins:
CVE-2015-0641 |
Severity: High |
Description: Cisco IOS XE 2.x and 3.x before 3.9.0S, 3.10 before 3.10.0S, 3.11 before 3.11.0S, 3.12 before 3.12.0S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device reload) via crafted IPv6 packets, aka Bug ID CSCub68073. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0638 |
Title: Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3, when a VRF interface is configured, allows remote attackers to cause a denial of service (interface queue wedge) via crafted ICMPv4 packets, aka Bug ID CSCsi02145. |
Type: Hardware |
Bulletins:
CVE-2015-0638 |
Severity: High |
Description: Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3, when a VRF interface is configured, allows remote attackers to cause a denial of service (interface queue wedge) via crafted ICMPv4 packets, aka Bug ID CSCsi02145. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0647 |
Title: Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) UDP packets, aka Bug ID CSCum98371. |
Type: Hardware |
Bulletins:
CVE-2015-0647 |
Severity: High |
Description: Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) UDP packets, aka Bug ID CSCum98371. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0649 |
Title: Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) TCP packets, aka Bug ID CSCun63514. |
Type: Hardware |
Bulletins:
CVE-2015-0649 |
Severity: High |
Description: Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) TCP packets, aka Bug ID CSCun63514. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0642 |
Title: Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 2.5.x, 2.6.x, 3.1.xS through 3.12.xS before 3.12.3S, 3.2.xE through 3.7.xE before 3.7.1E, 3.3.xSG, 3.4.xSG, and 3.13.xS before 3.13.2S allow remote attackers to cause a denial of... |
Type: Hardware |
Bulletins:
CVE-2015-0642 SFBID73333 |
Severity: High |
Description: Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 2.5.x, 2.6.x, 3.1.xS through 3.12.xS before 3.12.3S, 3.2.xE through 3.7.xE before 3.7.1E, 3.3.xSG, 3.4.xSG, and 3.13.xS before 3.13.2S allow remote attackers to cause a denial of service (device reload) by sending malformed IKEv2 packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCum36951. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0643 |
Title: Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 2.5.x, 2.6.x, 3.1.xS through 3.12.xS before 3.12.3S, 3.2.xE through 3.7.xE before 3.7.1E, 3.3.xSG, 3.4.xSG, and 3.13.xS before 3.13.2S allow remote attackers to cause a denial of... |
Type: Hardware |
Bulletins:
CVE-2015-0643 SFBID73333 |
Severity: High |
Description: Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 2.5.x, 2.6.x, 3.1.xS through 3.12.xS before 3.12.3S, 3.2.xE through 3.7.xE before 3.7.1E, 3.3.xSG, 3.4.xSG, and 3.13.xS before 3.13.2S allow remote attackers to cause a denial of service (memory consumption and device reload) by sending malformed IKEv2 packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCuo75572. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0644 |
Title: AppNav in Cisco IOS XE 3.8 through 3.10 before 3.10.3S, 3.11 before 3.11.3S, 3.12 before 3.12.1S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to execute arbitrary code or cause a denial of service... |
Type: Hardware |
Bulletins:
CVE-2015-0644 |
Severity: High |
Description: AppNav in Cisco IOS XE 3.8 through 3.10 before 3.10.3S, 3.11 before 3.11.3S, 3.12 before 3.12.1S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to execute arbitrary code or cause a denial of service (device reload) via a crafted TCP packet, aka Bug ID CSCuo53622. | ||||
Applies to: |
Created: 2015-03-26 |
Updated: 2024-09-07 |
ID: CVE-2015-0669 |
Title: The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 15.4S and 15.4(3)S allows remote attackers to modify configuration settings or cause a denial of service (partial service outage) by sending crafted Autonomic Networking (AN)... |
Type: Hardware |
Bulletins:
CVE-2015-0669 |
Severity: Medium |
Description: The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 15.4S and 15.4(3)S allows remote attackers to modify configuration settings or cause a denial of service (partial service outage) by sending crafted Autonomic Networking (AN) messages on an intranet network, aka Bug ID CSCup62167. | ||||
Applies to: |
Created: 2015-03-20 |
Updated: 2024-09-07 |
ID: CVE-2015-1084 |
Title: The user interface in WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, does not display URLs consistently, which makes it easier for remote attackers to conduct phishing attacks via a crafted URL. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1084 |
Severity: Medium |
Description: The user interface in WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, does not display URLs consistently, which makes it easier for remote attackers to conduct phishing attacks via a crafted URL. | ||||
Applies to: |
Created: 2015-03-18 |
Updated: 2024-09-07 |
ID: CVE-2015-1064 |
Title: Springboard in Apple iOS before 8.2 allows physically proximate attackers to bypass an intended activation requirement and read the home screen by leveraging an application crash during the activation process. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1064 |
Severity: Low |
Description: Springboard in Apple iOS before 8.2 allows physically proximate attackers to bypass an intended activation requirement and read the home screen by leveraging an application crash during the activation process. | ||||
Applies to: |
Created: 2015-03-12 |
Updated: 2024-09-07 |
ID: CVE-2015-1065 |
Title: Multiple buffer overflows in iCloud Keychain in Apple iOS before 8.2 and Apple OS X through 10.10.2 allow man-in-the-middle attackers to execute arbitrary code by modifying the client-server data stream during keychain recovery. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1065 SFBID73007 |
Severity: Medium |
Description: Multiple buffer overflows in iCloud Keychain in Apple iOS before 8.2 and Apple OS X through 10.10.2 allow man-in-the-middle attackers to execute arbitrary code by modifying the client-server data stream during keychain recovery. | ||||
Applies to: |
Created: 2015-03-12 |
Updated: 2024-09-07 |
ID: CVE-2015-1063 |
Title: CoreTelephony in Apple iOS before 8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and device restart) via a Class 0 SMS message. |
Type: Mobile Devices |
Bulletins:
CVE-2015-1063 |
Severity: High |
Description: CoreTelephony in Apple iOS before 8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and device restart) via a Class 0 SMS message. | ||||
Applies to: |
Created: 2015-03-12 |
Updated: 2024-09-07 |
ID: MITRE:28554 |
Title: Windows Telnet service buffer overflow vulnerability |
Type: Software |
Bulletins:
MITRE:28554 CVE-2015-0014 |
Severity: High |
Description: Buffer overflow in the Telnet service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows Telnet Service Buffer Overflow Vulnerability." | ||||
Applies to: |
Created: 2015-03-09 |
Updated: 2024-09-07 |
ID: CVE-2015-0661 |
Title: The SNMPv2 implementation in Cisco IOS XR allows remote authenticated users to cause a denial of service (snmpd daemon reload) via a malformed SNMP packet, aka Bug ID CSCur25858. |
Type: Hardware |
Bulletins:
CVE-2015-0661 |
Severity: Medium |
Description: The SNMPv2 implementation in Cisco IOS XR allows remote authenticated users to cause a denial of service (snmpd daemon reload) via a malformed SNMP packet, aka Bug ID CSCur25858. | ||||
Applies to: |
Created: 2015-03-05 |
Updated: 2024-09-07 |
ID: CVE-2015-0598 |
Title: The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693. |
Type: Hardware |
Bulletins:
CVE-2015-0598 |
Severity: Medium |
Description: The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693. | ||||
Applies to: |
Created: 2015-03-05 |
Updated: 2024-09-07 |
ID: CVE-2015-0659 |
Title: The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS allows remote attackers to trigger self-referential adjacencies via a crafted Autonomic Networking (AN) message, aka Bug ID CSCup62157. |
Type: Hardware |
Bulletins:
CVE-2015-0659 |
Severity: Medium |
Description: The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS allows remote attackers to trigger self-referential adjacencies via a crafted Autonomic Networking (AN) message, aka Bug ID CSCup62157. | ||||
Applies to: |
Created: 2015-03-05 |
Updated: 2024-09-07 |
ID: CVE-2015-0607 |
Title: The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that... |
Type: Hardware |
Bulletins:
CVE-2015-0607 SFBID72794 |
Severity: Medium |
Description: The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016. | ||||
Applies to: |
Created: 2015-03-05 |
Updated: 2024-09-07 |
ID: CVE-2015-0657 |
Title: Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192. |
Type: Hardware |
Bulletins:
CVE-2015-0657 |
Severity: Medium |
Description: Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192. | ||||
Applies to: |
Created: 2015-03-05 |
Updated: 2024-09-07 |
ID: CVE-2015-0204 |
Title: FREAK: SSL/TLS vulnerability |
Type: Web |
Bulletins:
CVE-2015-0204 |
Severity: Medium |
Description: The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role. | ||||
Applies to: SSL/TLS |
Created: 2015-03-04 |
Updated: 2024-09-07 |
ID: CVE-2015-0632 |
Title: Race condition in the Neighbor Discovery (ND) protocol implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service via a flood of Router Solicitation messages on the local network, aka Bug ID CSCuo67770. |
Type: Hardware |
Bulletins:
CVE-2015-0632 SFBID72797 |
Severity: Medium |
Description: Race condition in the Neighbor Discovery (ND) protocol implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service via a flood of Router Solicitation messages on the local network, aka Bug ID CSCuo67770. | ||||
Applies to: |
Created: 2015-02-26 |
Updated: 2024-09-07 |
ID: MITRE:28634 |
Title: Windows Error Reporting security feature bypass vulnerability |
Type: Software |
Bulletins:
MITRE:28634 CVE-2015-0001 |
Severity: Low |
Description: The Windows Error Reporting (WER) component in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to bypass the Protected Process Light protection mechanism and read the contents of arbitrary process-memory locations by leveraging administrative privileges, aka "Windows Error Reporting Security Feature Bypass Vulnerability." | ||||
Applies to: |
Created: 2015-02-23 |
Updated: 2024-09-07 |
ID: MITRE:27743 |
Title: WebDAV elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:27743 CVE-2015-0011 |
Severity: Medium |
Description: mrxdav.sys (aka the WebDAV driver) in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to bypass an impersonation protection mechanism, and obtain privileges for redirection of WebDAV requests, via a crafted application, aka "WebDAV Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-02-23 |
Updated: 2024-09-07 |
ID: MITRE:28297 |
Title: NLA Security Feature Bypass Vulnerability |
Type: Software |
Bulletins:
MITRE:28297 CVE-2015-0006 |
Severity: Medium |
Description: The Network Location Awareness (NLA) service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not perform mutual authentication to determine a domain connection, which allows remote attackers to trigger an unintended permissive configuration by spoofing DNS and LDAP responses on a local network, aka "NLA Security Feature Bypass Vulnerability." | ||||
Applies to: |
Created: 2015-02-23 |
Updated: 2024-09-07 |
ID: MITRE:28478 |
Title: Network policy server RADIUS implementation denial of service vulnerability |
Type: Software |
Bulletins:
MITRE:28478 CVE-2015-0015 |
Severity: High |
Description: Microsoft Windows Server 2003 SP2, Server 2008 SP2 and R2 SP1, and Server 2012 Gold and R2 allow remote attackers to cause a denial of service (system hang and RADIUS outage) via crafted username strings to (1) Internet Authentication Service (IAS) or (2) Network Policy Server (NPS), aka "Network Policy Server RADIUS Implementation Denial of Service Vulnerability." | ||||
Applies to: |
Created: 2015-02-23 |
Updated: 2024-09-07 |
ID: MITRE:28330 |
Title: Microsoft user profile service elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28330 CVE-2015-0004 |
Severity: High |
Description: The User Profile Service (aka ProfSvc) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges by conducting a junction attack to load another user's UsrClass.dat registry hive, aka MSRC ID 20674 or "Microsoft User Profile Service Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-02-23 |
Updated: 2024-09-07 |
ID: MITRE:28664 |
Title: Graphics component information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28664 CVE-2015-0002 |
Severity: High |
Description: The AhcVerifyAdminContext function in ahcache.sys in the Application Compatibility component in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not verify that an impersonation token is associated with an administrative account, which allows local users to gain privileges by running AppCompatCache.exe with a crafted DLL file, aka MSRC ID 20544 or "Microsoft Application Compatibility Infrastructure Elevation of Privilege Vulnerability." | ||||
Applies to: |
Created: 2015-02-23 |
Updated: 2024-09-07 |
ID: MITRE:28717 |
Title: Directory Traversal elevation of privilege vulnerability |
Type: Software |
Bulletins:
MITRE:28717 CVE-2015-0016 |
Severity: High |
Description: Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability." | ||||
Applies to: Microsoft Windows Remote Desktop Connection 7.0 Microsoft Windows Remote Desktop Connection 8.0 Microsoft Windows Remote Desktop Connection 8.1 |
Created: 2015-02-23 |
Updated: 2024-09-07 |
ID: CVE-2015-0618 |
Title: Cisco IOS XR 5.0.1 and 5.2.1 on Network Convergence System (NCS) 6000 devices and 5.1.3 and 5.1.4 on Carrier Routing System X (CRS-X) devices allows remote attackers to cause a denial of service (line-card reload) via malformed IPv6 packets with... |
Type: Hardware |
Bulletins:
CVE-2015-0618 SFBID72713 |
Severity: High |
Description: Cisco IOS XR 5.0.1 and 5.2.1 on Network Convergence System (NCS) 6000 devices and 5.1.3 and 5.1.4 on Carrier Routing System X (CRS-X) devices allows remote attackers to cause a denial of service (line-card reload) via malformed IPv6 packets with extension headers, aka Bug ID CSCuq95241. | ||||
Applies to: |
Created: 2015-02-21 |
Updated: 2024-09-07 |
ID: CVE-2015-2078 |
Title: MITM installed: Superfish certificate |
Type: Software |
Bulletins:
CVE-2015-2078 |
Severity: Medium |
Description: Superfish was previously included on some consumer notebook products shipped between September 2014 and February 2015 to assist customers with discovering products similar to what they are viewing.Vulnerabilities have been identified with the software, which include installation of a self-signed root certificate in the local trusted CA store. http://support.lenovo.com/us/en/product_security/superfish | ||||
Applies to: Lenovo laptops |
Created: 2015-02-20 |
Updated: 2024-09-07 |
ID: CVE-2015-2077 |
Title: MITM installed: Superfish adware |
Type: Software |
Bulletins:
CVE-2015-2077 |
Severity: Medium |
Description: Superfish was previously included on some consumer notebook products shipped between September 2014 and February 2015 to assist customers with discovering products similar to what they are viewing.Vulnerabilities have been identified with the software, which include installation of a self-signed root certificate in the local trusted CA store. http://support.lenovo.com/us/en/product_security/superfish | ||||
Applies to: Lenovo laptops |
Created: 2015-02-20 |
Updated: 2024-09-07 |
ID: CVE-2015-0622 |
Title: The Wireless Intrusion Detection (aka WIDS) functionality on Cisco Wireless LAN Controller (WLC) devices allows remote attackers to cause a denial of service (device outage) via crafted packets that are improperly handled during rendering of the... |
Type: Hardware |
Bulletins:
CVE-2015-0622 |
Severity: High |
Description: The Wireless Intrusion Detection (aka WIDS) functionality on Cisco Wireless LAN Controller (WLC) devices allows remote attackers to cause a denial of service (device outage) via crafted packets that are improperly handled during rendering of the Signature Events Summary page, aka Bug ID CSCus46861. | ||||
Applies to: |
Created: 2015-02-18 |
Updated: 2024-09-07 |
ID: CVE-2015-0609 |
Title: Race condition in the Common Classification Engine (CCE) in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via... |
Type: Hardware |
Bulletins:
CVE-2015-0609 SFBID72564 |
Severity: High |
Description: Race condition in the Common Classification Engine (CCE) in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCuj96752. | ||||
Applies to: |
Created: 2015-02-15 |
Updated: 2024-09-07 |
ID: CVE-2015-1474 |
Title: Multiple integer overflows in the GraphicBuffer::unflatten function in platform/frameworks/native/libs/ui/GraphicBuffer.cpp in Android through 5.0 allow attackers to gain privileges or cause a denial of service (memory corruption)... |
Type: Mobile Devices |
Bulletins:
CVE-2015-1474 SFBID72788 |
Severity: High |
Description: Multiple integer overflows in the GraphicBuffer::unflatten function in platform/frameworks/native/libs/ui/GraphicBuffer.cpp in Android through 5.0 allow attackers to gain privileges or cause a denial of service (memory corruption) via vectors that trigger a large number of (1) file descriptors or (2) integer values. | ||||
Applies to: |
Created: 2015-02-15 |
Updated: 2024-09-07 |
ID: CVE-2015-0593 |
Title: The Zone-Based Firewall implementation in Cisco IOS 12.4(122)T and earlier does not properly manage session-object structures, which allows remote attackers to cause a denial of service (device reload) via crafted network traffic, aka Bug ID CSCul65003. |
Type: Hardware |
Bulletins:
CVE-2015-0593 SFBID72549 |
Severity: High |
Description: The Zone-Based Firewall implementation in Cisco IOS 12.4(122)T and earlier does not properly manage session-object structures, which allows remote attackers to cause a denial of service (device reload) via crafted network traffic, aka Bug ID CSCul65003. | ||||
Applies to: |
Created: 2015-02-12 |
Updated: 2024-09-07 |
ID: CVE-2015-0592 |
Title: The Zone-Based Firewall implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers incorrect kernel-timer handling, aka Bug ID CSCuh25672. |
Type: Hardware |
Bulletins:
CVE-2015-0592 |
Severity: High |
Description: The Zone-Based Firewall implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers incorrect kernel-timer handling, aka Bug ID CSCuh25672. | ||||
Applies to: |
Created: 2015-02-11 |
Updated: 2024-09-07 |
ID: CVE-2015-0606 |
Title: The IOS Shell in Cisco IOS allows local users to cause a denial of service (device crash) via unspecified commands, aka Bug ID CSCur59696. |
Type: Hardware |
Bulletins:
CVE-2015-0606 SFBID72550 |
Severity: Medium |
Description: The IOS Shell in Cisco IOS allows local users to cause a denial of service (device crash) via unspecified commands, aka Bug ID CSCur59696. | ||||
Applies to: |
Created: 2015-02-11 |
Updated: 2024-09-07 |
ID: CVE-2015-0610 |
Title: Race condition in the object-group ACL feature in Cisco IOS 15.5(2)T and earlier allows remote attackers to bypass intended access restrictions via crafted network traffic that triggers improper handling of the timing of process switching and Cisco... |
Type: Hardware |
Bulletins:
CVE-2015-0610 SFBID72565 |
Severity: Medium |
Description: Race condition in the object-group ACL feature in Cisco IOS 15.5(2)T and earlier allows remote attackers to bypass intended access restrictions via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCun21071. | ||||
Applies to: |
Created: 2015-02-11 |
Updated: 2024-09-07 |
ID: CVE-2015-0608 |
Title: Race condition in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper... |
Type: Hardware |
Bulletins:
CVE-2015-0608 SFBID72566 |
Severity: High |
Description: Race condition in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCul48736. | ||||
Applies to: |
Created: 2015-02-11 |
Updated: 2024-09-07 |
ID: CVE-2014-8013 |
Title: The TACACS+ command-authorization implementation in Cisco NX-OS allows local users to cause a denial of service (device reload) via a long CLI command, aka Bug ID CSCur54182. |
Type: Hardware |
Bulletins:
CVE-2014-8013 SFBID72393 |
Severity: Medium |
Description: The TACACS+ command-authorization implementation in Cisco NX-OS allows local users to cause a denial of service (device reload) via a long CLI command, aka Bug ID CSCur54182. | ||||
Applies to: |
Created: 2015-02-03 |
Updated: 2024-09-07 |
ID: CVE-2014-4467 |
Title: WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site. |
Type: Mobile Devices |
Bulletins:
CVE-2014-4467 |
Severity: Medium |
Description: WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site. | ||||
Applies to: |
Created: 2015-01-30 |
Updated: 2024-09-07 |
ID: CVE-2014-8840 |
Title: The iTunes Store component in Apple iOS before 8.1.3 allows remote attackers to bypass a Safari sandbox protection mechanism by leveraging redirection of an SSL URL to the iTunes Store. |
Type: Mobile Devices |
Bulletins:
CVE-2014-8840 |
Severity: Medium |
Description: The iTunes Store component in Apple iOS before 8.1.3 allows remote attackers to bypass a Safari sandbox protection mechanism by leveraging redirection of an SSL URL to the iTunes Store. | ||||
Applies to: |
Created: 2015-01-30 |
Updated: 2024-09-07 |
ID: CVE-2014-4493 |
Title: The app-installation functionality in MobileInstallation in Apple iOS before 8.1.3 allows attackers to obtain control of the local app container by leveraging access to an enterprise distribution certificate for signing a crafted app. |
Type: Mobile Devices |
Bulletins:
CVE-2014-4493 |
Severity: High |
Description: The app-installation functionality in MobileInstallation in Apple iOS before 8.1.3 allows attackers to obtain control of the local app container by leveraging access to an enterprise distribution certificate for signing a crafted app. | ||||
Applies to: |
Created: 2015-01-30 |
Updated: 2024-09-07 |
ID: CVE-2014-4494 |
Title: Springboard in Apple iOS before 8.1.3 does not properly validate signatures when determining whether to solicit an app trust decision from the user, which allows attackers to bypass intended first-launch restrictions by leveraging... |
Type: Mobile Devices |
Bulletins:
CVE-2014-4494 |
Severity: Medium |
Description: Springboard in Apple iOS before 8.1.3 does not properly validate signatures when determining whether to solicit an app trust decision from the user, which allows attackers to bypass intended first-launch restrictions by leveraging access to an enterprise distribution certificate for signing a crafted app. | ||||
Applies to: |
Created: 2015-01-30 |
Updated: 2024-09-07 |
ID: CVE-2015-0586 |
Title: The Network-Based Application Recognition (NBAR) protocol implementation in Cisco IOS 15.3(100)M and earlier on Cisco 2900 Integrated Services Router (aka Cisco Internet Router) devices allows remote attackers to cause a denial of service (NBAR... |
Type: Hardware |
Bulletins:
CVE-2015-0586 SFBID72309 |
Severity: High |
Description: The Network-Based Application Recognition (NBAR) protocol implementation in Cisco IOS 15.3(100)M and earlier on Cisco 2900 Integrated Services Router (aka Cisco Internet Router) devices allows remote attackers to cause a denial of service (NBAR process hang) via IPv4 packets, aka Bug ID CSCuo73682. | ||||
Applies to: |
Created: 2015-01-28 |
Updated: 2024-09-07 |
ID: MITRE:28438 |
Title: RHSA-2015:0092 -- glibc security update |
Type: Miscellaneous |
Bulletins:
MITRE:28438 |
Severity: Low |
Description: The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application. (CVE-2015-0235) Red Hat would like to thank Qualys for reporting this issue. All glibc users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. | ||||
Applies to: glibc |
Created: 2015-01-28 |
Updated: 2015-03-09 |
ID: MITRE:28360 |
Title: RHSA-2015:0090 -- glibc security update |
Type: Miscellaneous |
Bulletins:
MITRE:28360 |
Severity: Low |
Description: The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application. (CVE-2015-0235) Red Hat would like to thank Qualys for reporting this issue. All glibc users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. | ||||
Applies to: glibc |
Created: 2015-01-28 |
Updated: 2015-03-09 |
ID: MITRE:28622 |
Title: ELSA-2015-0092 -- glibc security update |
Type: Miscellaneous |
Bulletins:
MITRE:28622 |
Severity: Low |
Description: [2.17-55.0.4.el7_0.5] - Remove strstr and strcasestr implementations using sse4.2 instructions. - Upstream commits 584b18eb4df61ccd447db2dfe8c8a7901f8c8598 and 1818483b15d22016b0eae41d37ee91cc87b37510 backported. (Jose E. Marchesi) [2.17-55.5] - Rebuild and run regression testing. [2.17-55.4] - Fix parsing of numeric hosts in gethostbyname_r (CVE-2015-0235, #1183535). [2.17-55.3] - Fix wordexp() to honour WRDE_NOCMD (CVE-2014-7817, #1170118) [2.17-55.2] - ftell: seek to end only when there are unflushed bytes (#1170187). [2.17-55.1] - Remove gconv transliteration loadable modules support (CVE-2014-5119, - _nl_find_locale: Improve handling of crafted locale names (CVE-2014-0475, | ||||
Applies to: glibc |
Created: 2015-01-28 |
Updated: 2015-03-09 |
ID: MITRE:28638 |
Title: ELSA-2015-0090 -- glibc security update |
Type: Miscellaneous |
Bulletins:
MITRE:28638 |
Severity: Low |
Description: [2.5-123.0.1.el5_11.1] - Switch to use malloc when the input line is too long [Orabug 19951108] - Use a /sys/devices/system/cpu/online for _SC_NPROCESSORS_ONLN implementation [Orabug 17642251] (Joe Jin) [2.5-123.1] - Fix parsing of numeric hosts in gethostbyname_r (CVE-2015-0235, #1183532). | ||||
Applies to: glibc |
Created: 2015-01-28 |
Updated: 2015-03-09 |
ID: MITRE:28006 |
Title: Use After Free Word Remote Code Execution Vulnerability |
Type: Software |
Bulletins:
MITRE:28006 CVE-2014-6357 |
Severity: High |
Description: Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Office 2013 RT Gold and SP1, Office for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 Gold and SP1, and Office Web Apps 2010 SP2 and 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Use After Free Word Remote Code Execution Vulnerability." | ||||
Applies to: Microsoft Office Compatibility Pack Microsoft Office Web Apps 2010 Microsoft Office Web Apps Server 2013 Microsoft SharePoint Server 2010 Microsoft SharePoint Server 2013 Microsoft Word 2013 Microsoft Word Viewer |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28328 |
Title: OWA XSS vulnerability () - MS14-075 |
Type: Software |
Bulletins:
MITRE:28328 CVE-2014-6326 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in Microsoft Exchange Server 2013 SP1 and Cumulative Update 6 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "OWA XSS Vulnerability," a different vulnerability than CVE-2014-6325. | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28291 |
Title: OWA XSS vulnerability () - MS14-075 |
Type: Software |
Bulletins:
MITRE:28291 CVE-2014-6325 |
Severity: Medium |
Description: Cross-site scripting (XSS) vulnerability in Microsoft Exchange Server 2013 SP1 and Cumulative Update 6 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "OWA XSS Vulnerability," a different vulnerability than CVE-2014-6326. | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28425 |
Title: Outlook Web App token spoofing vulnerability () - MS14-075 |
Type: Services |
Bulletins:
MITRE:28425 CVE-2014-6319 |
Severity: Medium |
Description: Outlook Web App (OWA) in Microsoft Exchange Server 2007 SP3, 2010 SP3, and 2013 SP1 and Cumulative Update 6 does not properly validate tokens in requests, which allows remote attackers to spoof the origin of e-mail messages via unspecified vectors, aka "Outlook Web App Token Spoofing Vulnerability." | ||||
Applies to: Microsoft Exchange Server 2007 Microsoft Exchange Server 2010 Microsoft Exchange Server 2013 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:27937 |
Title: Microsoft Office component use after free vulnerability |
Type: Software |
Bulletins:
MITRE:27937 CVE-2014-6364 |
Severity: High |
Description: Use-after-free vulnerability in Microsoft Office 2007 SP3; 2010 SP2; 2013 Gold, SP1, and SP2; and 2013 RT Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." | ||||
Applies to: Microsoft Office 2007 Microsoft Office 2010 Microsoft Office 2013 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28299 |
Title: Invalid index remote code execution vulnerability |
Type: Miscellaneous |
Bulletins:
MITRE:28299 CVE-2014-6356 |
Severity: High |
Description: Array index error in Microsoft Word 2007 SP3, Word 2010 SP2, and Office Compatibility Pack SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Invalid Index Remote Code Execution Vulnerability." | ||||
Applies to: Microsoft Office Compatibility Pack Microsoft Word 2007 Microsoft Word 2010 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:27932 |
Title: Internet Explorer XSS filter bypass vulnerability |
Type: Web |
Bulletins:
MITRE:27932 CVE-2014-6365 |
Severity: Medium |
Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the XSS filter via a crafted attribute of an element in an HTML document, aka "Internet Explorer XSS Filter Bypass Vulnerability," a different vulnerability than CVE-2014-6328. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28172 |
Title: Internet Explorer XSS filter bypass vulnerability |
Type: Web |
Bulletins:
MITRE:28172 CVE-2014-6328 |
Severity: Medium |
Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the XSS filter via a crafted attribute of an element in an HTML document, aka "Internet Explorer XSS Filter Bypass Vulnerability," a different vulnerability than CVE-2014-6365. | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:27704 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:27704 CVE-2014-6369 |
Severity: High |
Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 9 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28329 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28329 CVE-2014-6330 |
Severity: High |
Description: Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 9 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28430 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28430 CVE-2014-6366 |
Severity: High |
Description: Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28349 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28349 CVE-2014-8966 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28368 |
Title: Internet Explorer memory corruption vulnerability |
Type: Miscellaneous |
Bulletins:
MITRE:28368 CVE-2014-6363 |
Severity: High |
Description: vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." | ||||
Applies to: VBScript 5.6 VBScript 5.7 VBScript 5.8 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28376 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28376 CVE-2014-6368 |
Severity: Medium |
Description: Microsoft Internet Explorer 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28377 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28377 CVE-2014-6376 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6327 and CVE-2014-6329. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28392 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28392 CVE-2014-6373 |
Severity: High |
Description: Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28401 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28401 CVE-2014-6374 |
Severity: High |
Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28404 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28404 CVE-2014-6327 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6329 and CVE-2014-6376. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28408 |
Title: Internet Explorer memory corruption vulnerability |
Type: Web |
Bulletins:
MITRE:28408 CVE-2014-6375 |
Severity: High |
Description: Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||||
Applies to: Microsoft Internet Explorer 8 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28416 |
Title: Internet Explorer memory corruption vulnerability |
Type: Software |
Bulletins:
MITRE:28416 CVE-2014-6329 |
Severity: High |
Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6327 and CVE-2014-6376. | ||||
Applies to: Microsoft Internet Explorer 11 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28084 |
Title: Graphics component information disclosure vulnerability |
Type: Software |
Bulletins:
MITRE:28084 CVE-2014-6355 |
Severity: Medium |
Description: The Graphics Component in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly process JPEG images, which makes it easier for remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Graphics Component Information Disclosure Vulnerability." | ||||
Applies to: |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28280 |
Title: Global free remote code execution in excel vulnerability |
Type: Software |
Bulletins:
MITRE:28280 CVE-2014-6360 |
Severity: High |
Description: Microsoft Excel 2007 SP3, Excel 2010 SP2, and Office Compatibility Pack allow remote attackers to execute arbitrary code via a crafted Office document, aka "Global Free Remote Code Execution in Excel Vulnerability." | ||||
Applies to: Microsoft Excel 2007 Microsoft Excel 2010 Microsoft Office Compatibility Pack |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:28415 |
Title: Exchange URL redirection vulnerability () - MS14-075 |
Type: Software |
Bulletins:
MITRE:28415 CVE-2014-6336 |
Severity: Low |
Description: Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 6 does not properly validate redirection tokens, which allows remote attackers to redirect users to arbitrary web sites and spoof the origin of e-mail messages via unspecified vectors, aka "Exchange URL Redirection Vulnerability." | ||||
Applies to: Microsoft Exchange Server 2013 |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: MITRE:27446 |
Title: Excel invalid pointer remote code execution vulnerability |
Type: Software |
Bulletins:
MITRE:27446 CVE-2014-6361 |
Severity: High |
Description: Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 Gold and SP1, Excel 2013 RT Gold and SP1, and Office Compatibility Pack allow remote attackers to execute arbitrary code via a crafted Office document, aka "Excel Invalid Pointer Remote Code Execution Vulnerability." | ||||
Applies to: Microsoft Excel 2007 Microsoft Excel 2010 Microsoft Excel 2013 Microsoft Office Compatibility Pack |
Created: 2015-01-26 |
Updated: 2024-09-07 |
ID: CVE-2014-8008 |
Title: Absolute path traversal vulnerability in the Real-Time Monitoring Tool (RTMT) API in Cisco Unified Communications Manager (CUCM) allows remote authenticated users to read arbitrary files via a full pathname in an API command, aka Bug ID CSCur49414. |
Type: Hardware |
Bulletins:
CVE-2014-8008 SFBID72263 |
Severity: Medium |
Description: Absolute path traversal vulnerability in the Real-Time Monitoring Tool (RTMT) API in Cisco Unified Communications Manager (CUCM) allows remote authenticated users to read arbitrary files via a full pathname in an API command, aka Bug ID CSCur49414. | ||||
Applies to: Unified Communications Manager |
Created: 2015-01-22 |
Updated: 2024-09-07 |
ID: CVE-2014-6383 |
Title: The stateless firewall in Juniper Junos 13.3R3, 14.1R1, and 14.1R2, when using Trio-based PFE modules, does not properly match ports, which might allow remote attackers to bypass firewall rule. |
Type: Hardware |
Bulletins:
CVE-2014-6383 SFBID72071 |
Severity: Medium |
Description: The stateless firewall in Juniper Junos 13.3R3, 14.1R1, and 14.1R2, when using Trio-based PFE modules, does not properly match ports, which might allow remote attackers to bypass firewall rule. | ||||
Applies to: |
Created: 2015-01-16 |
Updated: 2024-09-07 |
ID: CVE-2014-6382 |
Title: The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of... |
Type: Hardware |
Bulletins:
CVE-2014-6382 SFBID72070 |
Severity: High |
Description: The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a crafted PAP Authenticate-Request after the PPPoE Discovery and LCP phase are complete. | ||||
Applies to: |
Created: 2015-01-16 |
Updated: 2024-09-07 |
ID: CVE-2014-6384 |
Title: Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D15, 12.3 before 12.3R9, 13.1 before 13.1R4-S3, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3, and 14.2 before 14.2R1 does not properly handle... |
Type: Hardware |
Bulletins:
CVE-2014-6384 SFBID72077 |
Severity: Medium |
Description: Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D15, 12.3 before 12.3R9, 13.1 before 13.1R4-S3, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3, and 14.2 before 14.2R1 does not properly handle double quotes in authorization attributes in the TACACS+ configuration, which allows local users to bypass the security policy and execute commands via unspecified vectors. | ||||
Applies to: |
Created: 2015-01-16 |
Updated: 2024-09-07 |
ID: CVE-2014-6386 |
Title: Juniper Junos 11.4 before 11.4R8, 12.1X44 before 12.1X44-D35, 12.1X45 before 12.1X45-D25, 12.1X46 before 12.1X46-D20, 12.1X47 before 12.1X47-D10, 12.2 before 12.2R9, 12.3R2 before 12.3R2-S3, 12.3 before 12.3R3, 13.1 before 13.1R4, and 13.2 before... |
Type: Hardware |
Bulletins:
CVE-2014-6386 SFBID72067 |
Severity: High |
Description: Juniper Junos 11.4 before 11.4R8, 12.1X44 before 12.1X44-D35, 12.1X45 before 12.1X45-D25, 12.1X46 before 12.1X46-D20, 12.1X47 before 12.1X47-D10, 12.2 before 12.2R9, 12.3R2 before 12.3R2-S3, 12.3 before 12.3R3, 13.1 before 13.1R4, and 13.2 before 13.2R1 allows remote attackers to cause a denial of service (assertion failure and rpd restart) via a crafted BGP FlowSpec prefix. | ||||
Applies to: |
Created: 2015-01-16 |
Updated: 2024-09-07 |
ID: CVE-2014-6385 |
Title: Juniper Junos 11.4 before 11.4R13, 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D15, 12.2 before 12.2R9, 12.3R7 before 12.3R7-S1, 12.3 before 12.3R8, 13.1 before 13.1R5, 13.2 before 13.2R6, 13.3 before 13.3R4, 14.1... |
Type: Hardware |
Bulletins:
CVE-2014-6385 SFBID72072 |
Severity: Medium |
Description: Juniper Junos 11.4 before 11.4R13, 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D15, 12.2 before 12.2R9, 12.3R7 before 12.3R7-S1, 12.3 before 12.3R8, 13.1 before 13.1R5, 13.2 before 13.2R6, 13.3 before 13.3R4, 14.1 before 14.1R2, and 14.2 before 14.2R1 allows remote attackers to cause a denial of service (kernel crash and restart) via a crafted fragmented OSPFv3 packet with an IPsec Authentication Header (AH). | ||||
Applies to: |
Created: 2015-01-16 |
Updated: 2024-09-07 |
ID: CVE-2015-0582 |
Title: The High Availability (HA) subsystem in Cisco NX-OS on MDS 9000 devices allows remote attackers to cause a denial of service via crafted traffic, aka Bug ID CSCuo09129. |
Type: Hardware |
Bulletins:
CVE-2015-0582 SFBID71979 |
Severity: Medium |
Description: The High Availability (HA) subsystem in Cisco NX-OS on MDS 9000 devices allows remote attackers to cause a denial of service via crafted traffic, aka Bug ID CSCuo09129. | ||||
Applies to: |
Created: 2015-01-09 |
Updated: 2024-09-07 |