Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2011-4016 | 1 Cisco | 1 Ios | 2016-12-07 | 5.4 MEDIUM | N/A |
The PPP implementation in Cisco IOS 12.2 and 15.0 through 15.2, when Point-to-Point Termination and Aggregation (PTA) and L2TP are used, allows remote attackers to cause a denial of service (device crash) via crafted network traffic, aka Bug ID CSCtf71673. | |||||
CVE-2013-4316 | 2 Apache, Oracle | 4 Struts, Flexcube Private Banking, Mysql Enterprise Monitor and 1 more | 2016-12-07 | 10.0 HIGH | N/A |
Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors. | |||||
CVE-2015-0798 | 3 Google, Mozilla, Oracle | 3 Android, Firefox, Solaris | 2016-12-07 | 5.0 MEDIUM | N/A |
The Reader mode feature in Mozilla Firefox before 37.0.1 on Android, and Desktop Firefox pre-release, does not properly handle privileged URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy. | |||||
CVE-2014-6521 | 1 Sun | 1 Sunos | 2016-12-07 | 7.2 HIGH | N/A |
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality, integrity, and availability via vectors related to CDE - Power Management Utility. | |||||
CVE-2015-0810 | 2 Apple, Mozilla | 2 Mac Os X, Firefox | 2016-12-06 | 4.3 MEDIUM | N/A |
Mozilla Firefox before 37.0 on OS X does not ensure that the cursor is visible, which allows remote attackers to conduct clickjacking attacks via a Flash object in conjunction with DIV elements associated with layered presentation, and crafted JavaScript code that interacts with an IMG element. | |||||
CVE-2015-0814 | 1 Mozilla | 1 Firefox | 2016-12-06 | 7.5 HIGH | N/A |
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | |||||
CVE-2014-6510 | 1 Sun | 1 Sunos | 2016-12-06 | 7.2 HIGH | N/A |
Unspecified vulnerability in Oracle Solaris 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Power Management Utility. | |||||
CVE-2014-6518 | 1 Sun | 1 Sunos | 2016-12-06 | 6.6 MEDIUM | N/A |
Unspecified vulnerability in Oracle Solaris 10 and 11 allows local users to affect integrity and availability via vectors related to Unix File System (UFS). | |||||
CVE-2014-6570 | 1 Sun | 1 Sunos | 2016-12-06 | 4.9 MEDIUM | N/A |
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6600 and CVE-2015-0397. | |||||
CVE-2014-6575 | 1 Sun | 1 Sunos | 2016-12-06 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows remote attackers to affect availability via unknown vectors related to Network, a different vulnerability than CVE-2004-0230. | |||||
CVE-2014-6600 | 1 Sun | 1 Sunos | 2016-12-06 | 4.9 MEDIUM | N/A |
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6570 and CVE-2015-0397. | |||||
CVE-2014-8651 | 1 Kde | 2 Kde-workspace, Plasma-desktop | 2016-12-06 | 7.2 HIGH | N/A |
The KDE Clock KCM policykit helper in kde-workspace before 4.11.14 and plasma-desktop before 5.1.1 allows local users to gain privileges via a crafted ntpUtility (ntp utility name) argument. | |||||
CVE-2014-9623 | 2 Openstack, Redhat | 2 Image Registry And Delivery Service \(glance\), Openstack | 2016-12-06 | 4.0 MEDIUM | N/A |
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting an image in the saving state. | |||||
CVE-2011-4516 | 1 Jasper Project | 1 Jasper | 2016-12-06 | 6.8 MEDIUM | N/A |
Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file. | |||||
CVE-2012-2150 | 1 Sgi | 1 Xfsprogs | 2016-12-06 | 5.0 MEDIUM | N/A |
xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image. | |||||
CVE-2013-2492 | 2 Firebirdsql, Microsoft | 2 Firebird, Windows | 2016-12-06 | 6.8 MEDIUM | N/A |
Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information. | |||||
CVE-2013-7437 | 1 Icoasoft | 1 Potrace | 2016-12-06 | 5.0 MEDIUM | N/A |
Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow. | |||||
CVE-2014-4259 | 1 Oracle | 1 Oracle And Sun Systems Product Suite | 2016-12-06 | 9.0 HIGH | N/A |
Unspecified vulnerability in the Solaris Cluster component in Oracle Sun Systems Products Suite 3.3 and 4.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to System management. | |||||
CVE-2014-4635 | 1 Emc | 1 Documentum Wdk | 2016-12-06 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum Web Development Kit (WDK) before 6.8 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | |||||
CVE-2014-4636 | 1 Emc | 1 Documentum Wdk | 2016-12-06 | 6.8 MEDIUM | N/A |
Cross-site request forgery (CSRF) vulnerability in EMC Documentum Web Development Kit (WDK) before 6.8 allows remote attackers to hijack the authentication of arbitrary users for requests that perform Docbase operations. |