Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2015-4477 |
Use-after-free vulnerability in the MediaStream playback feature in Mozilla Firefox before 40.0 allows remote attackers to execute arbitrary code via unspecified use of the Web Audio API. Published: August 15, 2015; 9:59:04 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-2015-4475 |
The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file. Published: August 15, 2015; 9:59:03 PM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2015-4474 |
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. Published: August 15, 2015; 9:59:02 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-2015-4473 |
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. Published: August 15, 2015; 9:59:00 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-2015-1819 |
The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack. Published: August 14, 2015; 2:59:03 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2013-7443 |
Buffer overflow in the skip-scan optimization in SQLite 3.8.2 allows remote attackers to cause a denial of service (crash) via crafted SQL statements. Published: August 12, 2015; 10:59:00 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2015-5523 |
The ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving multiple whitespace characters before an empty href, which triggers a large memory allocation. Published: August 11, 2015; 10:59:15 AM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2015-5522 |
Heap-based buffer overflow in the ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving a command character in an href. Published: August 11, 2015; 10:59:14 AM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
CVE-2015-4495 |
The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015. Published: August 07, 2015; 8:59:04 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2015-1283 |
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716. Published: July 22, 2015; 8:59:12 PM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
CVE-2015-3185 |
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior. Published: July 20, 2015; 7:59:03 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2015-4772 |
Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition. Published: July 16, 2015; 7:01:02 AM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2015-4771 |
Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to RBR. Published: July 16, 2015; 7:01:02 AM -0400 |
V3.x:(not available) V2.0: 3.5 LOW |
CVE-2015-4769 |
Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4767. Published: July 16, 2015; 7:01:00 AM -0400 |
V3.x:(not available) V2.0: 3.5 LOW |
CVE-2015-4767 |
Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4769. Published: July 16, 2015; 7:00:58 AM -0400 |
V3.x:(not available) V2.0: 1.7 LOW |
CVE-2015-4761 |
Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached. Published: July 16, 2015; 7:00:54 AM -0400 |
V3.x:(not available) V2.0: 3.5 LOW |
CVE-2015-4757 |
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer. Published: July 16, 2015; 7:00:51 AM -0400 |
V3.x:(not available) V2.0: 3.5 LOW |
CVE-2015-4752 |
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S. Published: July 16, 2015; 7:00:46 AM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2015-4737 |
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Pluggable Auth. Published: July 16, 2015; 7:00:32 AM -0400 |
V3.x:(not available) V2.0: 3.5 LOW |
CVE-2015-2661 |
Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows local users to affect availability via unknown vectors related to Client. Published: July 16, 2015; 7:00:20 AM -0400 |
V3.x:(not available) V2.0: 2.1 LOW |