Latest CVE Feed
-
5.4
MEDIUMCVE-2014-6945
The Neeku Naaku Dash Dash (aka com.dakshaa.nndd) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.... Read more
Affected Products : neeku_naaku_dash_dash- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
5.4
MEDIUMCVE-2014-6944
The mitfahrgelegenheit.at (aka com.carpooling.android.at) application 2.3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certifica... Read more
Affected Products : mitfahrgelegenheit.at- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
5.4
MEDIUMCVE-2014-6943
The Konigsleiten (aka com.knigsleiten) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.... Read more
Affected Products : konigsleiten- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
5.4
MEDIUMCVE-2014-6942
The Alisha Marie (Unofficial) (aka com.automon.ay.alisha.marie) application 1.4.0.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted c... Read more
Affected Products : alisha_marie- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4148
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers ... Read more
- Actively Exploited
- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4141
Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2014-4140
Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability."... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4138
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4130... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4137
Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4134
Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4133
Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4132
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4130... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4130
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4132... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4129
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4128
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4127
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4126
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2014-4124
Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2014-4123.... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
8.8
HIGHCVE-2014-4123
Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," as exploited in the wild in October 2014, a different vulnerability than CVE-2014-412... Read more
- Actively Exploited
- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2014-4122
Microsoft .NET Framework 2.0 SP2, 3.5, and 3.5.1 omits the ASLR protection mechanism, which allows remote attackers to obtain potentially sensitive information about memory addresses by leveraging the predictability of an executable image's location, aka ... Read more
Affected Products : .net_framework- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025