Total
5210 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2015-0662 | 1 Cisco | 1 Anyconnect Secure Mobility Client | 2015-10-28 | 7.2 HIGH | N/A |
Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to gain privileges via crafted IPC messages that trigger use of root privileges for a software-package installation, aka Bug ID CSCus79385. | |||||
CVE-2015-0682 | 1 Cisco | 1 Unified Communications Domain Manager | 2015-10-28 | 6.5 MEDIUM | N/A |
Cisco Unified Communications Domain Manager 8.1(4) allows remote authenticated users to execute arbitrary code by visiting a "deprecated page," aka Bug ID CSCup90168. | |||||
CVE-2015-7003 | 1 Apple | 1 Mac Os X | 2015-10-27 | 6.8 MEDIUM | N/A |
coreaudiod in Audio in Apple OS X before 10.11.1 does not initialize an unspecified data structure, which allows attackers to execute arbitrary code via a crafted app. | |||||
CVE-2015-5945 | 1 Apple | 1 Mac Os X | 2015-10-27 | 7.2 HIGH | N/A |
The Sandbox subsystem in Apple OS X before 10.11.1 allows local users to gain privileges via vectors involving NVRAM parameters. | |||||
CVE-2015-7016 | 1 Apple | 1 Mac Os X | 2015-10-27 | 7.6 HIGH | N/A |
The MCX Application Restrictions component in Apple OS X before 10.11.1, when Managed Configuration is enabled, mishandles provisioning profiles, which allows attackers to bypass intended entitlement restrictions and gain privileges via a crafted developer-signed app. | |||||
CVE-2015-7751 | 1 Juniper | 1 Junos | 2015-10-20 | 6.9 MEDIUM | N/A |
Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X50 before 14.1X50-D105, 14.1X51 before 14.1X51-D70, 14.1X53 before 14.1X53-D25, 14.1X55 before 14.1X55-D20, 14.2 before 14.2R1, 15.1 before 15.1F2 or 15.1R1, and 15.1X49 before 15.1X49-D10 does not require a password for the root user when pam.conf is "corrupted," which allows local users to gain root privileges by modifying the file. | |||||
CVE-2014-3586 | 1 Redhat | 1 Jboss Enterprise Application Platform | 2015-10-13 | 2.1 LOW | N/A |
The default configuration for the Command Line Interface in Red Hat Enterprise Application Platform before 6.4.0 and WildFly (formerly JBoss Application Server) uses weak permissions for .jboss-cli-history, which allows local users to obtain sensitive information via unspecified vectors. | |||||
CVE-2015-7766 | 1 Zohocorp | 1 Manageengine Opmanager | 2015-10-09 | 9.0 HIGH | N/A |
PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO." | |||||
CVE-2015-3878 | 1 Google | 1 Android | 2015-10-07 | 4.3 MEDIUM | N/A |
Media Projection in Android 5.x before 5.1.1 LMY48T and 6.0 before 2015-10-01 allows attackers to bypass an intended screen-recording warning feature and obtain sensitive screen-snapshot information via a crafted application that references a long application name, aka internal bug 23345192. | |||||
CVE-2015-3879 | 1 Google | 1 Android | 2015-10-07 | 9.3 HIGH | N/A |
Media Player Framework in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, aka internal bug 23223325. | |||||
CVE-2015-7717 | 1 Google | 1 Android | 2015-10-07 | 9.3 HIGH | N/A |
mediaserver in Android 5.x before 5.1.1 LMY48T and 6.0 before 2015-10-01 allows attackers to gain privileges via a crafted application, aka internal bug 19573085, a different vulnerability than CVE-2015-6596. | |||||
CVE-2015-6606 | 1 Google | 1 Android | 2015-10-07 | 9.3 HIGH | N/A |
The Secure Element Evaluation Kit (aka SEEK or SmartCard API) plugin in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 22301786. | |||||
CVE-2015-6596 | 1 Google | 1 Android | 2015-10-07 | 9.3 HIGH | N/A |
mediaserver in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, aka internal bugs 20731946 and 20719651, a different vulnerability than CVE-2015-7717. | |||||
CVE-2015-5645 | 1 Icz | 1 Matchasns | 2015-10-07 | 6.5 MEDIUM | N/A |
ICZ MATCHA SNS before 1.3.7 allows remote authenticated users to obtain administrative privileges via unspecified vectors. | |||||
CVE-2015-3865 | 1 Google | 1 Android | 2015-10-07 | 9.3 HIGH | N/A |
The Runtime subsystem in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23050463. | |||||
CVE-2015-3847 | 1 Google | 1 Android | 2015-10-07 | 6.4 MEDIUM | N/A |
Bluetooth in Android before 5.1.1 LMY48T allows attackers to remove stored SMS messages via a crafted application, aka internal bug 22343270. | |||||
CVE-2015-4964 | 1 Ibm | 1 Urbancode Deploy | 2015-10-06 | 6.0 MEDIUM | N/A |
IBM UrbanCode Deploy 6.0 and 6.0.1.x before 6.0.1.10, 6.1.1.x before 6.1.1.8, and 6.1.2 writes admin AUTH_TOKEN values to execution logs, which allows remote authenticated users to gain privileges by leveraging the ability to create and execute a process. | |||||
CVE-2015-7709 | 1 Arkeia | 1 Western Digital Arkeia | 2015-10-06 | 10.0 HIGH | N/A |
The arkeiad daemon in the Arkeia Backup Agent in Western Digital Arkeia 11.0.12 and earlier allows remote attackers to bypass authentication and execute arbitrary commands via a series of crafted requests involving the ARKFS_EXEC_CMD operation. | |||||
CVE-2015-7685 | 1 Glpi-project | 1 Glpi | 2015-10-06 | 4.0 MEDIUM | N/A |
GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php. | |||||
CVE-2015-2027 | 1 Ibm | 1 Websphere Extreme Scale | 2015-10-05 | 2.1 LOW | N/A |
IBM WebSphere eXtreme Scale 7.1.0 before 7.1.0.3 and 7.1.1 before 7.1.1.1 improperly performs logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation. |