Max CVSS | 10.0 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2015-4840 | 5.0 |
Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.
|
13-05-2022 - 14:38 | 21-10-2015 - 23:59 | |
CVE-2016-10307 | 10.0 |
Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This
|
05-05-2021 - 14:46 | 30-03-2017 - 07:59 | |
CVE-2011-0657 | 7.5 |
DNSAPI.dll in the DNS client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process DNS queries, which allows remote
|
28-09-2020 - 12:58 | 13-04-2011 - 18:55 | |
CVE-2011-0657 | 7.5 |
DNSAPI.dll in the DNS client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process DNS queries, which allows remote
|
28-09-2020 - 12:58 | 13-04-2011 - 18:55 | |
CVE-2015-1472 | 7.5 |
The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow)
|
13-06-2019 - 21:29 | 08-04-2015 - 10:59 | |
CVE-2015-0066 | 9.3 |
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015
|
12-10-2018 - 22:08 | 11-02-2015 - 03:01 | |
CVE-2015-0053 | 9.3 |
Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than
|
12-10-2018 - 22:08 | 11-02-2015 - 03:00 | |
CVE-2015-0068 | 9.3 |
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than C
|
12-10-2018 - 22:08 | 11-02-2015 - 03:01 | |
CVE-2015-0067 | 9.3 |
Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
|
12-10-2018 - 22:08 | 11-02-2015 - 03:01 | |
CVE-2015-0052 | 9.3 |
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than C
|
12-10-2018 - 22:08 | 11-02-2015 - 03:00 | |
CVE-2015-0019 | 9.3 |
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
|
12-10-2018 - 22:07 | 11-02-2015 - 03:00 | |
CVE-2015-0020 | 9.3 |
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability tha
|
12-10-2018 - 22:07 | 11-02-2015 - 03:00 | |
CVE-2009-1568 | 9.3 |
Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter.
|
10-10-2018 - 19:37 | 08-12-2009 - 23:30 | |
CVE-2009-1569 | 9.3 |
Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time.
|
10-10-2018 - 19:37 | 08-12-2009 - 23:30 | |
CVE-2008-0358 | 6.8 |
SQL injection vulnerability in index.php in Pixelpost 1.7 allows remote attackers to execute arbitrary SQL commands via the parent_id parameter.
|
29-09-2017 - 01:30 | 18-01-2008 - 22:00 | |
CVE-2015-0313 | 10.0 |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited
|
08-09-2017 - 01:29 | 02-02-2015 - 19:59 | |
CVE-2006-1416 | 4.3 |
Cross-site scripting (XSS) vulnerability in afmsearch.aspx in Absolute FAQ Manager .NET 4.0 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified search module parameters, possibly the question parameter.
|
20-07-2017 - 01:30 | 28-03-2006 - 20:02 | |
CVE-2003-1034 | 4.6 |
The RPM installation of SAP DB 7.x creates the (1) dbmsrv or (2) lserver programs with world-writable permissions, which allows local users to gain privileges by modifying those programs.
|
11-07-2017 - 01:29 | 15-04-2004 - 04:00 |