Filter and search through 887 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2015-8651 | Integer overflow in Adobe Flash Player allows attackers to execute code. | 8.8 | 863 | Neutral | Yes |
| Yes |
| CVE-2015-8562 | Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP Us... | 0.0 | 0 | Trending | Yes | Yes |
| CVE-2015-7756 | The encryption implementation in Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2015-7755 | Juniper ScreenOS contains an improper authentication vulnerability that could allow unauthorized remote administrative access to the device. | 9.8 | 885 | Neutral | Yes | Yes |
| CVE-2015-7645 | Adobe Flash Player allows remote attackers to execute arbitrary code via a crafted SWF file. | 7.8 | 728 | Neutral | Yes | Yes |
| CVE-2015-6585 | hwpapp.dll in Hangul Word Processor allows remote attackers to execute arbitrary code via a crafted heap spray, and by leveraging a "type confusion" v... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2015-6175 | The kernel in Microsoft Windows contains a vulnerability that allows local users to gain privileges via a crafted application. | 7.8 | 749 | Neutral | Yes | Yes |
| CVE-2015-5123 | Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to execu... | 9.8 | 999 | Neutral | Yes | Yes |
| CVE-2015-5122 | Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to ex... | 9.8 | 999 | Neutral | Yes | Yes |
| CVE-2015-5119 | A use-after-free vulnerability exists within the ActionScript 3 ByteArray class in Adobe Flash Player that allows an attacker to perform remote code e... | 9.8 | 999 | Low | Yes | Yes |
| CVE-2015-4902 | Unspecified vulnerability in Oracle Java SE allows remote attackers to affect integrity via Unknown vectors related to deployment. | 5.3 | 464 | Neutral | Yes | Yes |
| CVE-2015-4495 | Moxilla Firefox allows remote attackers to bypass the Same Origin Policy to read arbitrary files or gain privileges. | 8.8 | 927 | Neutral | Yes | Yes |
| CVE-2015-3900 | RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, whi... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2015-3113 | Heap-based buffer overflow vulnerability in Adobe Flash Player allows remote attackers to execute code. | 9.8 | 999 | Neutral | Yes | Yes |
| CVE-2015-3043 | A memory corruption vulnerability exists in Adobe Flash Player that allows an attacker to perform remote code execution. | 9.8 | 999 | Neutral | Yes | Yes |
| CVE-2015-2945 | mt-phpincgi.php in Hajime Fujimoto mt-phpincgi before 2015-05-15 does not properly restrict URLs, which allows remote attackers to conduct PHP object ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2015-2590 | An unspecified vulnerability exists within Oracle Java Runtime Environment that allows an attacker to perform remote code execution. | 9.8 | 906 | Neutral | Yes | Yes |
| CVE-2015-2546 | The kernel-mode driver in Microsoft Windows OS and Server allows local users to gain privileges via a crafted application. | 8.2 | 802 | Neutral | Yes | Yes |
| CVE-2015-2545 | Microsoft Office allows remote attackers to execute arbitrary code via a crafted EPS image. | 7.8 | 814 | Neutral | Yes | Yes |
| CVE-2015-2509 | Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows user-assisted remote attackers to execute arbitr... | 0.0 | 0 | Neutral | Yes | Yes |