Filter and search through 887 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2015-2502 | Microsoft Internet Explorer contains a memory corruption vulnerability that allows an attacker to execute code or cause a denial-of-service (DoS). | 8.8 | 970 | Neutral | Yes |
| Yes |
| CVE-2015-2426 | A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted Ope... | 8.8 | 863 | Neutral | Yes | Yes |
| CVE-2015-2425 | Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS). | 8.8 | 970 | Neutral | Yes | Yes |
| CVE-2015-2424 | Microsoft PowerPoint allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document. | 8.8 | 970 | Neutral | Yes | Yes |
| CVE-2015-2387 | ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server allows local users to gain privileges via a crafted application. | 7.8 | 857 | Neutral | Yes | Yes |
| CVE-2015-2360 | Win32k.sys in the kernel-mode drivers in Microsoft Windows allows local users to gain privileges or cause denial-of-service (DoS). | 8.8 | 970 | Neutral | Yes | Yes |
| CVE-2015-1770 | Microsoft Office allows remote attackers to execute arbitrary code via a crafted Office document. | 8.8 | 863 | Neutral | Yes | Yes |
| CVE-2015-1769 | A privilege escalation vulnerability exists when the Windows Mount Manager component improperly processes symbolic links. | 6.6 | 520 | Neutral | Yes | Yes |
| CVE-2015-1701 | An unspecified vulnerability exists in the Win32k.sys kernel-mode driver in Microsoft Windows Server that allows a local attacker to execute arbitrary... | 7.8 | 728 | Low | Yes | Yes |
| CVE-2015-1642 | Microsoft Office contains a memory corruption vulnerability that allows remote attackers to execute arbitrary code via a crafted document. | 7.8 | 857 | Neutral | Yes | Yes |
| CVE-2015-1641 | Microsoft Office contains a memory corruption vulnerability due to failure to properly handle rich text format files in memory. Successful exploitatio... | 7.8 | 857 | Neutral | Yes | Yes |
| CVE-2015-1494 | The FancyBox for WordPress plugin before 3.0.3 for WordPress does not properly restrict access, which allows remote attackers to conduct cross-site sc... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2015-0313 | Use-after-free vulnerability in Adobe Flash Player allows remote attackers to execute code. | 9.8 | 999 | Neutral | Yes | Yes |
| CVE-2015-0311 | Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute code. | 9.8 | 999 | Neutral | Yes | Yes |
| CVE-2015-0310 | Adobe Flash Player does not properly restrict discovery of memory addresses, which allows attackers to bypass the address space layout randomization (... | 7.8 | 792 | Neutral | Yes | Yes |
| CVE-2015-0096 | Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Window... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2015-0072 | Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy and inje... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2015-0071 | Microsoft Internet Explorer allows remote attackers to bypass the address space layout randomization (ASLR) protection mechanism via a crafted web sit... | 6.5 | 506 | Neutral | Yes | Yes |
| CVE-2015-0016 | Directory traversal vulnerability in the TS WebProxy (TSWbPrxy) component in Microsoft Windows allows remote attackers to escalate privileges. | 7.8 | 850 | Neutral | Yes | Yes |
| CVE-2014-9163 | Stack-based buffer overflow in Adobe Flash Player allows attackers to execute code remotely. | 7.8 | 728 | Neutral | Yes | Yes |