Latest CVE Feed
-
7.5
HIGHCVE-2015-1253
core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, rela... Read more
- Published: May. 20, 2015
- Modified: Apr. 12, 2025
-
7.5
HIGHCVE-2015-1252
common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does not properly handle wraps, which allows remote attackers to bypass a sandbox protection mechanism or cause a denial of service (out-of-bounds write) via vectors that trigger a wri... Read more
- Published: May. 20, 2015
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2015-1251
Use-after-free vulnerability in the SpeechRecognitionClient implementation in the Speech subsystem in Google Chrome before 43.0.2357.65 allows remote attackers to execute arbitrary code via a crafted document.... Read more
- Published: May. 20, 2015
- Modified: Apr. 12, 2025
-
4.0
MEDIUMCVE-2015-0189
The cluster repository manager in IBM WebSphere MQ 7.5 before 7.5.0.5 and 8.0 before 8.0.0.2 allows remote authenticated administrators to cause a denial of service (memory overwrite and daemon outage) by triggering multiple transmit-queue records.... Read more
Affected Products : websphere_mq- Published: May. 20, 2015
- Modified: Apr. 12, 2025
-
6.4
MEDIUMCVE-2014-8924
The server in IBM License Metric Tool 7.2.2 before IF15 and 7.5 before IF24 and Tivoli Asset Discovery for Distributed 7.2.2 before IF15 and 7.5 before IF24 allows remote attackers to read arbitrary files or send TCP requests to intranet servers via XML d... Read more
- Published: May. 20, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2014-4776
IBM License Metric Tool 9 before 9.1.0.2 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.... Read more
Affected Products : license_metric_tool- Published: May. 20, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2014-6211
The command-line scripts in IBM WebSphere Commerce 6.0 through 6.0.0.11, 7.0 through 7.0.0.9, and 7.0 Feature Pack 2 through 8, when debugging is configured, do not properly restrict the logging of personal data, which allows local users to obtain sensiti... Read more
Affected Products : websphere_commerce- Published: May. 20, 2015
- Modified: Apr. 12, 2025
-
10.0
HIGHCVE-2015-1920
IBM WebSphere Application Server (WAS) 6.1 through 6.1.0.47, 7.0 before 7.0.0.39, 8.0 before 8.0.0.11, and 8.5 before 8.5.5.6 allows remote attackers to execute arbitrary code by sending crafted instructions in a management-port session.... Read more
Affected Products : websphere_application_server- Published: May. 20, 2015
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2015-0740
Cross-site request forgery (CSRF) vulnerability in Cisco Unified Intelligence Center 10.6(1) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCus28826.... Read more
- Published: May. 20, 2015
- Modified: Jul. 31, 2025
-
3.5
LOWCVE-2015-3988
Multiple cross-site scripting (XSS) vulnerabilities in OpenStack Dashboard (Horizon) 2015.1.0 allow remote authenticated users to inject arbitrary web script or HTML via the metadata to a (1) Glance image, (2) Nova flavor or (3) Host Aggregate.... Read more
- Published: May. 19, 2015
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2015-3885
Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.... Read more
- Published: May. 19, 2015
- Modified: Apr. 12, 2025
-
7.2
HIGHCVE-2015-3409
Untrusted search path vulnerability in Module::Signature before 0.75 allows local users to gain privileges via a Trojan horse module under the current working directory, as demonstrated by a Trojan horse Text::Diff module.... Read more
- Published: May. 19, 2015
- Modified: Apr. 12, 2025
-
10.0
HIGHCVE-2015-3408
Module::Signature before 0.74 allows remote attackers to execute arbitrary shell commands via a crafted SIGNATURE file which is not properly handled when generating checksums from a signed manifest.... Read more
- Published: May. 19, 2015
- Modified: Apr. 12, 2025
-
5.0
MEDIUMCVE-2015-3407
Module::Signature before 0.74 allows remote attackers to bypass signature verification for files via a signature file that does not list the files.... Read more
- Published: May. 19, 2015
- Modified: Apr. 12, 2025
-
7.8
HIGHCVE-2015-1846
unzoo allows remote attackers to cause a denial of service (infinite loop and resource consumption) via unspecified vectors to the (1) ExtrArch or (2) ListArch function, related to pointer handling.... Read more
Affected Products : unzoo- Published: May. 19, 2015
- Modified: Apr. 12, 2025
-
10.0
HIGHCVE-2015-1845
Buffer overflow in the EntrReadArch function in unzoo might allow remote attackers to execute arbitrary code via unspecified vectors.... Read more
Affected Products : unzoo- Published: May. 19, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2015-0267
The Red Hat module-setup.sh script for kexec-tools, as distributed in the kexec-tools before 2.0.7-19 packages in Red Hat Enterprise Linux, allows local users to write to arbitrary files via a symlink attack on a temporary file.... Read more
Affected Products : kexec-tools- Published: May. 19, 2015
- Modified: Apr. 12, 2025
-
4.0
MEDIUMCVE-2015-0739
The Lights-Out Management (LOM) implementation in Cisco FireSIGHT System Software 5.3.0 on Sourcefire 3D Sensor devices allows remote authenticated users to perform arbitrary Baseboard Management Controller (BMC) file uploads via unspecified vectors, aka ... Read more
- Published: May. 19, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2015-3631
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.... Read more
- Published: May. 18, 2015
- Modified: Apr. 12, 2025
-
7.2
HIGHCVE-2015-3630
Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via ... Read more
- Published: May. 18, 2015
- Modified: Apr. 12, 2025