Critical
|
7 Oct 2015 |
7 Oct 2015 |
CPAI-2015-1168
|
Adobe APSB15-23
|
CVE-2015-5578 CVE-2015-5579
|
Adobe Flash Player Memory Corruption (APSB15-23: CVE-2015-5578; CVE-2015-5579)
|
Critical
|
7 Oct 2015 |
7 Oct 2015 |
CPAI-2015-1166
|
APSB15-23 Adobe
|
CVE-2015-5575
|
Adobe Flash Player Out of Bounds Memory Corruption (APSB15-23: CVE-2015-5575)
|
Critical
|
7 Oct 2015 |
7 Oct 2015 |
CPAI-2015-1176
|
Adobe APSB15-23
|
CVE-2015-5581
|
Adobe Flash Player Use After Free Remote Code Execution (APSB15-23: CVE-2015-5581)
|
Critical
|
7 Oct 2015 |
7 Oct 2015 |
CPAI-2015-1180
|
Adobe APSB15-23
|
CVE-2015-5580
|
Adobe Flash Player Memory Corruption (APSB15-23: CVE-2015-5580)
|
High
|
18 May 2015 |
6 Oct 2015 |
CPAI-2015-1143
|
|
CVE-2015-2825
|
Wordpress Simple Ads Manager Arbitrary File Upload - Ver2 (CVE-2015-2825)
|
Critical
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1148
|
Adobe APSB15-23
|
CVE-2015-6678
|
Adobe Flash Player Buffer Overflow (APSB15-23: CVE-2015-6678)
|
Critical
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1149
|
Adobe APSB15-23
|
CVE-2015-6679
|
Adobe Flash Player Security Bypass (APSB15-23: CVE-2015-6679)
|
Critical
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1146
|
Adobe APSB15-23
|
CVE-2015-6676
|
Adobe Flash Player Buffer Overflow (APSB15-23: CVE-2015-6676)
|
Critical
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1150
|
Adobe APSB15-23
|
CVE-2015-6682
|
Adobe Flash Player Use After Free Code Execution (APSB15-23: CVE-2015-6682)
|
Critical
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1138
|
Adobe APSB15-23
|
CVE-2015-5568
|
Adobe Flash Player Security Bypass (APSB15-23: CVE-2015-5568)
|
Critical
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1139
|
Adobe APSB15-23
|
CVE-2015-5570
|
Adobe Flash Player Use After Free Code Execution (APSB15-23: CVE-2015-5570)
|
High
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1140
|
Adobe APSB15-23
|
CVE-2015-5572
|
Adobe Flash Player Security Bypass (APSB15-23: CVE-2015-5572)
|
Critical
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1141
|
Adobe APSB15-23
|
CVE-2015-5573
|
Adobe Flash Player Type Confusion (APSB15-23: CVE-2015-5573)
|
Critical
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1134
|
Adobe APSB15-23
|
CVE-2015-5567
|
Adobe Flash Player Memory Corruption (APSB15-23: CVE-2015-5567)
|
Critical
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1144
|
Adobe APSB15-23
|
CVE-2015-5587
|
Adobe Flash Player Heap Buffer Overflow (APSB15-23: CVE-2015-5587)
|
Critical
|
29 Sep 2015 |
6 Oct 2015 |
CPAI-2015-1145
|
Adobe APSB15-23
|
CVE-2015-5588
|
Adobe Flash Player Memory Corruption (APSB15-23: CVE-2015-5588)
|
Medium
|
4 Oct 2015 |
6 Oct 2015 |
CPAI-2015-1126
|
Oracle
|
CVE-2015-2605
|
Oracle Endeca Information Discovery Integrator ETL Server MoveFile Directory Traversal (CVE-2015-2605)
|
High
|
6 Oct 2015 |
6 Oct 2015 |
CPAI-2015-1137
|
|
|
Sysax Multi Server SSH Component Denial Of Service
|
High
|
29 Sep 2015 |
1 Oct 2015 |
CPAI-2015-1119
|
ManageEngine
|
|
ManageEngine OpManager AgentDetailsUtil agentKey SQL Injection
|
Critical
|
29 Sep 2015 |
1 Oct 2015 |
CPAI-2015-1117
|
EMC
|
CVE-2015-0538
|
EMC AutoStart ftagent Opcode 85 Subcode 33 SQL Injection (CVE-2015-0538)
|
Medium
|
30 Sep 2015 |
1 Oct 2015 |
CPAI-2015-1121
|
Oracle
|
CVE-2015-2606
|
Oracle Endeca Information Discovery Integrator ETL Server RenameFile Directory Traversal (CVE-2015-2606)
|
High
|
8 Sep 2015 |
30 Sep 2015 |
CPAI-2015-1096
|
Microsoft MS15-097
|
CVE-2015-2506
|
Microsoft Windows OpenType Font Parsing Denial Of Service (MS15-097: CVE-2015-2506)
|
High
|
29 Sep 2015 |
30 Sep 2015 |
CPAI-2015-1120
|
ManageEngine
|
|
ManageEngine Multiple Products It360SPUtil resIds SQL Injection
|
Critical
|
29 Sep 2015 |
29 Sep 2015 |
CPAI-2015-1116
|
EMC
|
CVE-2015-0538
|
EMC AutoStart ftagent Opcode 83 Subcode 22 SQL Injection (CVE-2015-0538)
|
High
|
22 Sep 2015 |
24 Sep 2015 |
CPAI-2015-1114
|
|
CVE-2014-5337
|
WordPress Mobile Pack Information Disclosure (CVE-2014-5337)
|
Critical
|
20 Sep 2015 |
20 Sep 2015 |
CPAI-2015-1111
|
|
CVE-2015-4499
|
Bugzilla Mail Authentication Mechanism Bypass (CVE-2015-4499)
|
Critical
|
18 May 2015 |
17 Sep 2015 |
CPAI-2015-0763
|
|
CVE-2004-0627
|
MySQL Malformed Password Authentication - Ver2 (CVE-2004-0627)
|
High
|
18 May 2015 |
17 Sep 2015 |
CPAI-2015-0696
|
|
CVE-2002-1315
|
IPlanet Web Admin Cross-Site Scripting - Ver2 (CVE-2002-1315)
|
Medium
|
15 Jul 2015 |
17 Sep 2015 |
CPAI-2015-0854
|
Adobe APSB15-16
|
CVE-2015-3114
|
Adobe Flash Player Security Bypass (APSB15-16: CVE-2015-3114)
|
Critical
|
28 Jul 2015 |
17 Sep 2015 |
CPAI-2015-0888
|
|
CVE-2015-2212 CVE-2015-5623
|
WordPress post Request Privilege Escalation (CVE-2015-2212; CVE-2015-5623)
|
Critical
|
17 Sep 2015 |
17 Sep 2015 |
CPAI-2015-1110
|
Adobe APSB15-19
|
CVE-2015-5127
|
Adobe Flash Player Use after Free Code Execution (APSB15-19: CVE-2015-5127)
|
High
|
7 Jun 2015 |
16 Sep 2015 |
CPAI-2015-0643
|
|
|
Microsoft Word Intruder RTF FILE
|
Critical
|
8 Sep 2015 |
16 Sep 2015 |
CPAI-2015-1100
|
|
|
PHP Unserialize Function Use After Free
|
Critical
|
8 Sep 2015 |
16 Sep 2015 |
CPAI-2015-1066
|
Microsoft MS15-094
|
CVE-2015-2487
|
Microsoft Internet Explorer Memory Corruption (MS15-094: CVE-2015-2487)
|
Critical
|
16 Sep 2015 |
16 Sep 2015 |
CPAI-2015-1107
|
|
|
Cisco Router SYNful Knock Implant HTTP Request
|
High
|
10 Sep 2015 |
10 Sep 2015 |
CPAI-2015-1103
|
|
|
Adobe Reader and Acrobat Corrupted Stream Denial of Service
|
Critical
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1088
|
Microsoft MS15-094
|
CVE-2015-2492
|
Microsoft Internet Explorer Memory Corruption (MS15-094: CVE-2015-2492)
|
Critical
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1090
|
Microsoft MS15-094
|
CVE-2015-2498
|
Microsoft Internet Explorer Memory Corruption (MS15-094: CVE-2015-2498)
|
Critical
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1085
|
Microsoft MS15-094
|
CVE-2015-2493
|
Microsoft Internet Explorer Memory Corruption (MS15-094: CVE-2015-2493)
|
Critical
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1069
|
Microsoft MS15-094
|
CVE-2015-2490
|
Microsoft Internet Explorer Memory Corruption (MS15-094: CVE-2015-2490)
|
Critical
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1068
|
Microsoft MS15-094
|
CVE-2015-2491
|
Microsoft Internet Explorer Memory Corruption (MS15-094: CVE-2015-2491)
|
High
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1095
|
Microsoft MS15-99
|
CVE-2015-2523
|
Microsoft Office Memory Corruption (MS15-99: CVE-2015-2523)
|
High
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1093
|
Microsoft MS15-099
|
CVE-2015-2520
|
Microsoft Office Memory Corruption (MS15-099: CVE-2015-2520)
|
High
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1099
|
Microsoft MS15-099
|
CVE-2015-2521
|
Microsoft Office Memory Corruption (MS15-99: CVE-2015-2521)
|
High
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1086
|
Microsoft MS15-094
|
CVE-2015-2483
|
Microsoft Internet Explorer Information Disclosure (MS15-094: CVE-2015-2483)
|
Critical
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1070
|
Microsoft MS15-094
|
CVE-2015-2485
|
Microsoft Internet Explorer Memory Corruption (MS15-094: CVE-2015-2485)
|
High
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1071
|
Microsoft MS15-094
|
CVE-2015-2484
|
Microsoft Edge security bypass (MS15-094: CVE-2015-2484)
|
Critical
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1064
|
Microsoft MS15-094
|
CVE-2015-2486
|
Microsoft Internet Explorer Memory Corruption (MS15-094: CVE-2015-2486)
|
High
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1087
|
Microsoft MS15-094
|
CVE-2015-2489
|
Microsoft Internet Explorer Elevation of Privilege (MS15-094: CVE-2015-2489)
|
Critical
|
8 Sep 2015 |
8 Sep 2015 |
CPAI-2015-1089
|
Microsoft MS15-094
|
CVE-2015-2500
|
Microsoft Internet Explorer Memory Corruption (MS15-094: CVE-2015-2500)
|