Max CVSS | 10.0 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2015-4000 | 4.3 |
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a Clie
|
22-10-2024 - 13:42 | 21-05-2015 - 00:59 | |
CVE-2015-2590 | 10.0 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability th
|
16-07-2024 - 17:43 | 16-07-2015 - 10:59 | |
CVE-2015-5157 | 7.2 |
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
|
14-03-2024 - 19:58 | 31-08-2015 - 10:59 | |
CVE-2015-3290 | 7.2 |
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.
|
05-02-2024 - 20:15 | 31-08-2015 - 10:59 | |
CVE-2015-2808 | 5.0 |
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial
|
07-09-2023 - 17:15 | 01-04-2015 - 02:00 | |
CVE-2015-5364 | 7.8 |
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet f
|
02-02-2023 - 19:17 | 31-08-2015 - 10:59 | |
CVE-2015-0499 | 3.5 |
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
|
20-09-2022 - 20:44 | 16-04-2015 - 16:59 | |
CVE-2015-4757 | 3.5 |
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
|
20-09-2022 - 20:28 | 16-07-2015 - 11:00 | |
CVE-2015-0505 | 3.5 |
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
|
16-09-2022 - 19:56 | 16-04-2015 - 16:59 | |
CVE-2015-2582 | 4.0 |
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
|
08-09-2022 - 21:02 | 16-07-2015 - 10:59 | |
CVE-2015-2573 | 4.0 |
Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
|
08-09-2022 - 21:01 | 16-04-2015 - 17:00 | |
CVE-2015-2571 | 4.0 |
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
|
08-09-2022 - 21:00 | 16-04-2015 - 17:00 | |
CVE-2015-4752 | 4.0 |
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.
|
08-09-2022 - 20:59 | 16-07-2015 - 11:00 | |
CVE-2015-2643 | 4.0 |
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
|
08-09-2022 - 20:59 | 16-07-2015 - 11:00 | |
CVE-2015-2648 | 4.0 |
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.
|
08-09-2022 - 20:59 | 16-07-2015 - 11:00 | |
CVE-2015-3152 | 4.3 |
Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade at
|
29-08-2022 - 20:05 | 16-05-2016 - 10:59 | |
CVE-2015-0441 | 4.0 |
Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.
|
26-08-2022 - 16:04 | 16-04-2015 - 16:59 | |
CVE-2015-0433 | 4.0 |
Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.
|
26-08-2022 - 16:03 | 16-04-2015 - 16:59 | |
CVE-2015-2568 | 5.0 |
Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.
|
04-08-2022 - 19:58 | 16-04-2015 - 17:00 | |
CVE-2015-0501 | 5.7 |
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
|
19-07-2022 - 17:01 | 16-04-2015 - 16:59 | |
CVE-2015-1283 | 6.8 |
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspec
|
05-07-2022 - 18:57 | 23-07-2015 - 00:59 | |
CVE-2015-0477 | 4.3 |
Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans.
|
13-05-2022 - 14:57 | 16-04-2015 - 16:59 | |
CVE-2015-0469 | 10.0 |
Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
|
13-05-2022 - 14:57 | 16-04-2015 - 16:59 | |
CVE-2015-0480 | 5.8 |
Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.
|
13-05-2022 - 14:57 | 16-04-2015 - 16:59 | |
CVE-2015-0488 | 5.0 |
Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE.
|
13-05-2022 - 14:57 | 16-04-2015 - 16:59 | |
CVE-2015-0460 | 9.3 |
Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
|
13-05-2022 - 14:57 | 16-04-2015 - 16:59 | |
CVE-2015-0478 | 4.3 |
Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.
|
13-05-2022 - 14:57 | 16-04-2015 - 16:59 | |
CVE-2015-0470 | 4.3 |
Unspecified vulnerability in Oracle Java SE 8u40 allows remote attackers to affect integrity via unknown vectors related to Hotspot.
|
13-05-2022 - 14:57 | 16-04-2015 - 16:59 | |
CVE-2015-4733 | 10.0 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
|
13-05-2022 - 14:38 | 16-07-2015 - 11:00 | |
CVE-2015-4732 | 10.0 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability th
|
13-05-2022 - 14:38 | 16-07-2015 - 11:00 | |
CVE-2015-4760 | 10.0 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
|
13-05-2022 - 14:38 | 16-07-2015 - 11:00 | |
CVE-2015-4731 | 10.0 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
|
13-05-2022 - 14:38 | 16-07-2015 - 11:00 | |
CVE-2015-4749 | 4.3 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.
|
13-05-2022 - 14:38 | 16-07-2015 - 11:00 | |
CVE-2015-4748 | 7.6 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
|
13-05-2022 - 14:38 | 16-07-2015 - 11:00 | |
CVE-2015-2613 | 5.0 |
Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
|
13-05-2022 - 14:38 | 16-07-2015 - 10:59 | |
CVE-2015-2625 | 2.6 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.
|
13-05-2022 - 14:38 | 16-07-2015 - 10:59 | |
CVE-2015-2601 | 5.0 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
|
13-05-2022 - 14:38 | 16-07-2015 - 10:59 | |
CVE-2015-2621 | 5.0 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allows remote attackers to affect confidentiality via vectors related to JMX.
|
13-05-2022 - 14:38 | 16-07-2015 - 10:59 | |
CVE-2015-2628 | 10.0 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
|
13-05-2022 - 14:38 | 16-07-2015 - 10:59 | |
CVE-2015-2632 | 5.0 |
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
|
13-05-2022 - 14:38 | 16-07-2015 - 10:59 | |
CVE-2015-1334 | 4.6 |
attach.c in LXC 1.1.2 and earlier uses the proc filesystem in a container, which allows local container users to escape AppArmor or SELinux confinement by mounting a proc filesystem with a crafted (1) AppArmor profile or (2) SELinux label.
|
31-05-2019 - 21:29 | 12-08-2015 - 14:59 | |
CVE-2015-1331 | 4.9 |
lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*.
|
31-05-2019 - 21:29 | 12-08-2015 - 14:59 | |
CVE-2015-1276 | 7.5 |
Use-after-free vulnerability in content/browser/indexed_db/indexed_db_backing_store.cc in the IndexedDB implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1273 | 6.8 |
Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid JPEG2000 data in a PDF do
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1278 | 4.3 |
content/browser/web_contents/web_contents_impl.cc in Google Chrome before 44.0.2403.89 does not ensure that a PDF document's modal dialog is closed upon navigation to an interstitial page, which allows remote attackers to spoof URLs via a crafted doc
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1279 | 7.5 |
Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspeci
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1271 | 6.8 |
PDFium, as used in Google Chrome before 44.0.2403.89, does not properly handle certain out-of-memory conditions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a c
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1287 | 4.3 |
Blink, as used in Google Chrome before 44.0.2403.89, enables a quirks-mode exception that limits the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Sam
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1272 | 7.5 |
Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChanne
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1289 | 7.5 |
Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1282 | 6.8 |
Multiple use-after-free vulnerabilities in fpdfsdk/src/javascript/Document.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF do
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1274 | 6.8 |
Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user's previous "Always open f
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1270 | 6.8 |
The ucnv_io_getConverterName function in common/ucnv_io.cpp in International Components for Unicode (ICU), as used in Google Chrome before 44.0.2403.89, mishandles converter names with initial x- substrings, which allows remote attackers to cause a d
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1277 | 7.5 |
Use-after-free vulnerability in the accessibility implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging lack of certain validity checks for acc
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1281 | 4.3 |
core/loader/ImageLoader.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly determine the V8 context of a microtask, which allows remote attackers to bypass Content Security Policy (CSP) restrictions by providing an image fr
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1284 | 7.5 |
The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page's maximum number of frames, which allows remote attackers to cause a denial of service (inva
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1285 | 5.0 |
The XSSAuditor::canonicalize function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 44.0.2403.89, does not properly choose a truncation point, which makes it easier for remote attackers to obtain sens
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1288 | 6.8 |
The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecifie
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1286 | 4.3 |
Cross-site scripting (XSS) vulnerability in the V8ContextNativeHandler::GetModuleSystem function in extensions/renderer/v8_context_native_handler.cc in Google Chrome before 44.0.2403.89 allows remote attackers to inject arbitrary web script or HTML b
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-1280 | 7.5 |
SkPictureShader.cpp in Skia, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging access to a renderer process and providing cra
|
30-10-2018 - 16:27 | 23-07-2015 - 00:59 | |
CVE-2015-5366 | 5.0 |
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect chec
|
05-01-2018 - 02:30 | 31-08-2015 - 10:59 | |
CVE-2015-5477 | 7.8 |
named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
|
10-11-2017 - 02:29 | 29-07-2015 - 14:59 | |
CVE-2015-4634 | 7.5 |
SQL injection vulnerability in graphs.php in Cacti before 0.8.8e allows remote attackers to execute arbitrary SQL commands via the local_graph_id parameter.
|
22-09-2017 - 01:29 | 11-08-2015 - 14:59 | |
CVE-2015-1268 | 5.0 |
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript
|
31-12-2016 - 02:59 | 26-06-2015 - 14:59 | |
CVE-2015-1266 | 5.0 |
content/browser/webui/content_web_ui_controller_factory.cc in Google Chrome before 43.0.2357.130 does not properly consider the scheme in determining whether a URL is associated with a WebUI SiteInstance, which allows remote attackers to bypass inten
|
31-12-2016 - 02:59 | 26-06-2015 - 14:59 | |
CVE-2015-1267 | 5.0 |
Blink, as used in Google Chrome before 43.0.2357.130, does not properly restrict the creation context during creation of a DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that uses a Blink publi
|
31-12-2016 - 02:59 | 26-06-2015 - 14:59 | |
CVE-2015-1269 | 4.3 |
The DecodeHSTSPreloadRaw function in net/http/transport_security_state.cc in Google Chrome before 43.0.2357.130 does not properly canonicalize DNS hostnames before making comparisons to HSTS or HPKP preload entries, which allows remote attackers to b
|
31-12-2016 - 02:59 | 26-06-2015 - 14:59 | |
CVE-2015-4167 | 4.7 |
The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted
|
22-12-2016 - 02:59 | 05-08-2015 - 18:59 | |
CVE-2015-3291 | 2.1 |
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register,
|
22-12-2016 - 02:59 | 31-08-2015 - 10:59 | |
CVE-2003-0455 | 4.6 |
The imagemagick libmagick library 5.5 and earlier creates temporary files insecurely, which allows local users to create or overwrite arbitrary files.
|
18-10-2016 - 02:34 | 07-08-2003 - 04:00 | |
CVE-2014-8873 | 10.0 |
A .desktop file in the Debian openjdk-7 package 7u79-2.5.5-1~deb8u1 includes a MIME type registration that is added to /etc/mailcap by mime-support, which allows remote attackers to execute arbitrary code via a JAR file.
|
10-11-2015 - 16:32 | 09-11-2015 - 16:59 |