Handler on Duty: Johannes Ullrich
Threat Level: green
Loading...
|
|
Submitted By | Date |
---|---|
Comment | |
Richard Ashford - www.insysnet.com | 2004-10-28 05:16:21 |
There has been a significant rise in SMTP port 25 traffic likely due to the Netsky and Bagle worms (notice the SMTP absolute figures over the past 40 days). Mail servers across the internet appear to be being bombarded. I have also seen an affect on a number of websites - my assumption is that unpatched systems and badly configured firewalls are allowing out internal traffic on port 25 to spread the worm variants - this outgoing traffic is disrupting outgoing web server traffic. I have noticed problems with a number of different ISPs and with some of clients with mail servers directly on the internet. I believe that the Virus vendors have significantly under-estimated the distribution of these mass-email worms. Apart from the obvious patches and up-to-date Virus software, my advice is close down outgoing port 25 to all but internal mail servers and ensure all mail is routed through the internal servers - this will prevent any infected systems from spreading the worm further. Let's hope this settles down over the next few days, otherwise it has the potential to bring the internet to it's knees. | |
Marcus H. Sachs, SANS Institute | 2003-10-10 00:34:57 |
SANS Top-20 Entry: U6 Sendmail http://isc.sans.org/top20.html#u6 Sendmail is the program that sends, receives, and forwards most electronic mail processed on UNIX and Linux systems. Sendmail is the most popular Mail Transfer Agent (MTA) and its widespread use on the Internet has historically made it a prime target of attackers, resulting in numerous exploits over the years. Most of these exploits are successful only against older or unpatched versions of the software. Despite the fact that the known vulnerabilities are well documented and have been repaired in newer releases, there remain so many outdated or misconfigured versions still in use today that Sendmail remains one of the most frequently attacked services. Among the most recent critical vulnerabilities are: CERT Advisory CA-2003-12 Buffer Overflow in Sendmail CERT Advisory CA-2003-07 Remote Buffer Overflow in Sendmail CERT Advisory CA-2003-25 Buffer Overflow in Sendmail |
CVE # | Description |
---|---|
CVE-2005-0944 | Unknown vulnerability in Microsoft Jet DB engine (msjet40.dll) 4.00.8618.0, related to insufficient data validation, allows remote attackers to execute arbitrary code via a crafted mdb file. |
CVE-2005-1208 | Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer. |
CVE-2006-0001 | Stack-based buffer overflow in Microsoft Publisher 2000 through 2003 allows user-assisted remote attackers to execute arbitrary code via a crafted PUB file, which causes an overflow when parsing fonts. |
CVE-2007-6593 | Multiple stack-based buffer overflows in l123sr.dll in Autonomy (formerly Verity) KeyView SDK, as used by IBM Lotus Notes 5.x through 8.x, allow user-assisted remote attackers to execute arbitrary code via the (1) Length and (2) Value fields for certain Types in a Lotus 1-2-3 (.123) file in the Worksheet File (WKS) format, as demonstrated by a file with a crafted SRANGE record, a different vulnerability than CVE-2007-5909. |
CVE-2008-0112 | Unspecified vulnerability in Microsoft Excel 2000 SP3, and Office for Mac 2004 and 2008 allows user-assisted remote attackers to execute arbitrary code via a crafted .SLK file that is not properly handled when importing the file, aka "Excel File Import Vulnerability." |
CVE-2008-4265 | Microsoft Office Excel 2000 SP3 allows remote attackers to execute arbitrary code via a crafted Excel spreadsheet that contains a malformed object, which triggers memory corruption during the loading of records from this spreadsheet, aka "File Format Parsing Vulnerability." |
CVE-2008-4268 | The Windows Search component in Microsoft Windows Vista Gold and SP1 and Server 2008 does not properly free memory during a save operation for a Windows Search file, which allows remote attackers to execute arbitrary code via a crafted saved-search file, aka "Windows Saved Search Vulnerability." |
CVE-2010-2883 | Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information. |
CVE-2011-0101 | Microsoft Excel 2002 SP3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RealTimeData record, related to a stTopic field, double-byte characters, and an incorrect pointer calculation, aka "Excel Record Parsing WriteAV Vulnerability." |
CVE-2011-0257 | Integer signedness error in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PnSize opcode in a PICT file that triggers a stack-based buffer overflow. |
CVE-2011-0611 | Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011. |
CVE-2011-0802 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814. |
CVE-2011-1336 | Buffer overflow in ALZip 8.21 and earlier allows remote attackers to execute arbitrary code via a crafted mim file. |
CVE-2011-1591 | Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file. |
CVE-2012-0158 | The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability." |
CVE-2012-0184 | Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2008 and 2011 for Mac; Excel Viewer; and Office Compatibility Pack SP2 and SP3 do not properly handle memory during the opening of files, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel SXLI Record Memory Corruption Vulnerability." |
CVE-2012-1723 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot. |
CVE-2012-1889 | Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site. |
CVE-2012-4681 | Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class. |
CVE-2012-4792 | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012. |
CVE-2012-5076 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS. |
CVE-2013-0010 | Cross-site scripting (XSS) vulnerability in Microsoft System Center Operations Manager 2007 SP1 and R2 allows remote attackers to inject arbitrary web script or HTML via crafted input, aka "System Center Operations Manager Web Console XSS Vulnerability," a different vulnerability than CVE-2013-0009. |
CVE-2013-0019 | Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability." |
CVE-2013-0021 | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability." |
CVE-2013-0022 | Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer LsGetTrailInfo Use After Free Vulnerability." |
CVE-2013-0026 | Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer InsertElement Use After Free Vulnerability." |
CVE-2013-0029 | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CHTML Use After Free Vulnerability." |
CVE-2013-0074 | Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability." |
CVE-2013-0077 | Quartz.dll in DirectShow in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows remote attackers to execute arbitrary code via crafted media content in (1) a media file, (2) a media stream, or (3) a Microsoft Office document, aka "Media Decompression Vulnerability." |
CVE-2013-0079 | Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file that triggers incorrect memory allocation, aka "Visio Viewer Tree Object Type Confusion Vulnerability." |
CVE-2013-0088 | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability." |
CVE-2013-0089 | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability." |
CVE-2013-0092 | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability." |
CVE-2013-0093 | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability." |
CVE-2013-0094 | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability." |
CVE-2013-0422 | Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue. |
CVE-2013-0431 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490. |
CVE-2013-0603 | Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0604. |
CVE-2013-0604 | Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0603. |
CVE-2013-0622 | Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2013-0624. |
CVE-2013-0623 | Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-1530, CVE-2013-0601, CVE-2013-0605, CVE-2013-0616, CVE-2013-0619, and CVE-2013-0620. |
CVE-2013-0624 | Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2013-0622. |
CVE-2013-0626 | Stack-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0610. |
CVE-2013-0633 | Buffer overflow in Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and Mac OS X, before 10.3.183.51 and 11.x before 11.2.202.262 on Linux, before 11.1.111.32 on Android 2.x and 3.x, and before 11.1.115.37 on Android 4.x allows remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013. |
CVE-2013-0634 | Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and Mac OS X, before 10.3.183.51 and 11.x before 11.2.202.262 on Linux, before 11.1.111.32 on Android 2.x and 3.x, and before 11.1.115.37 on Android 4.x allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, as exploited in the wild in February 2013. |
CVE-2013-0638 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-0647. |
CVE-2013-0641 | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013. |
CVE-2013-0646 | Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors. |
CVE-2013-0648 | Unspecified vulnerability in the ExternalInterface ActionScript functionality in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, allows remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013. |
CVE-2013-0707 | Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Police 2010 allows remote attackers to execute arbitrary code via a crafted file. |
CVE-2013-0809 | Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493. |
CVE-2013-0986 | Buffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted enof atoms in a movie file. |
CVE-2013-1085 | Stack-based buffer overflow in the nim: protocol handler in Novell GroupWise Messenger 2.04 and earlier, and Novell Messenger 2.1.x and 2.2.x before 2.2.2, allows remote attackers to execute arbitrary code via an import command containing a long string in the filename parameter. |
CVE-2013-1307 | Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-0811. |
CVE-2013-1309 | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551. |
CVE-2013-1310 | Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability." |
CVE-2013-1311 | Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability." |
CVE-2013-1312 | Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability." |
CVE-2013-1313 | Object Linking and Embedding (OLE) Automation in Microsoft Windows XP SP3 does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted RTF document, aka "OLE Automation Remote Code Execution Vulnerability." |
CVE-2013-1315 | Microsoft SharePoint Server 2007 SP3, 2010 SP1 and SP2, and 2013; Office Web Apps 2010; Excel 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
CVE-2013-1324 | Stack-based buffer overflow in Microsoft Office 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT allows remote attackers to execute arbitrary code via a crafted WordPerfect document (.wpd) file, aka "Word Stack Buffer Overwrite Vulnerability." |
CVE-2013-1325 | Heap-based buffer overflow in Microsoft Office 2003 SP3 and 2007 SP3 allows remote attackers to execute arbitrary code via a crafted WordPerfect document (.wpd) file, aka "Word Heap Overwrite Vulnerability." |
CVE-2013-1331 | Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow Vulnerability." |
CVE-2013-1347 | Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013. |
CVE-2013-1488 | The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to execute arbitrary code via unspecified vectors involving reflection, Libraries, "improper toString calls," and the JDBC driver manager, as demonstrated by James Forshaw during a Pwn2Own competition at CanSecWest 2013. |
CVE-2013-1491 | The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013. |
CVE-2013-1690 | Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location. |
CVE-2013-2420 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient "validation of images" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets. |
CVE-2013-2460 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "insufficient access checks" in the tracing component. |
CVE-2013-2463 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image attribute verification" in 2D. |
CVE-2013-2465 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D. |
CVE-2013-2471 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks." |
CVE-2013-2472 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ShortBandedRaster size checks" in 2D. |
CVE-2013-2473 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D. |
CVE-2013-2577 | Buffer overflow in XnView before 2.04 allows remote attackers to execute arbitrary code via a crafted PCT file. |
CVE-2013-2729 | Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727. |
CVE-2013-3111 | Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123. |
CVE-2013-3115 | Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162. |
CVE-2013-3117 | Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3122 and CVE-2013-3124. |
CVE-2013-3118 | Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125. |
CVE-2013-3120 | Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125. |
CVE-2013-3123 | Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111. |
CVE-2013-3128 | The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability." |
CVE-2013-3134 | The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 on 64-bit platforms does not properly allocate arrays of structures, which allows remote attackers to execute arbitrary code via a crafted .NET Framework application that changes array data, aka "Array Allocation Vulnerability." |
CVE-2013-3139 | Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142. |
CVE-2013-3142 | Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139. |
CVE-2013-3143 | Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161. |
CVE-2013-3146 | Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152. |
CVE-2013-3147 | Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-3148 | Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153. |
CVE-2013-3155 | Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3157. |
CVE-2013-3158 | Microsoft Excel 2003 SP3 and 2007 SP3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
CVE-2013-3163 | Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151. |
CVE-2013-3164 | Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-3181 | usp10.dll in the Unicode Scripts Processor in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "Uniscribe Font Parsing Engine Memory Corruption Vulnerability." |
CVE-2013-3184 | Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-3191 | Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3187 and CVE-2013-3193. |
CVE-2013-3193 | Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3187 and CVE-2013-3191. |
CVE-2013-3203 | Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3206, CVE-2013-3207, and CVE-2013-3209. |
CVE-2013-3204 | Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-3205 | Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-3206 | Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3203, CVE-2013-3207, and CVE-2013-3209. |
CVE-2013-3208 | Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-3329 | Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335. |
CVE-2013-3343 | Adobe Flash Player before 10.3.183.90 and 11.x before 11.7.700.224 on Windows, before 10.3.183.90 and 11.x before 11.7.700.225 on Mac OS X, before 10.3.183.90 and 11.x before 11.2.202.291 on Linux, before 11.1.111.59 on Android 2.x and 3.x, and before 11.1.115.63 on Android 4.x; Adobe AIR before 3.7.0.2090 on Windows and Android and before 3.7.0.2100 on Mac OS X; and Adobe AIR SDK & Compiler before 3.7.0.2090 on Windows and before 3.7.0.2100 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. |
CVE-2013-3345 | Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. |
CVE-2013-3346 | Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341. |
CVE-2013-3347 | Integer overflow in Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code via PCM data that is not properly handled during resampling. |
CVE-2013-3352 | Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3354 and CVE-2013-3355. |
CVE-2013-3353 | Buffer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-3356. |
CVE-2013-3354 | Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3352 and CVE-2013-3355. |
CVE-2013-3355 | Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3352 and CVE-2013-3354. |
CVE-2013-3356 | Buffer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-3353. |
CVE-2013-3357 | Integer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-3358. |
CVE-2013-3361 | Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3362, CVE-2013-3363, and CVE-2013-5324. |
CVE-2013-3362 | Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3363, and CVE-2013-5324. |
CVE-2013-3363 | Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-5324. |
CVE-2013-3664 | Trimble SketchUp (formerly Google SketchUp) before 2013 (13.0.3689) allows remote attackers to execute arbitrary code via a crafted color palette table in a MAC Pict texture, which triggers an out-of-bounds stack write. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-3662. NOTE: this issue was SPLIT due to different affected products and codebases (ADT1); CVE-2013-7388 has been assigned to the paintlib issue. |
CVE-2013-3845 | Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-3848 | Microsoft Word Automation Services in SharePoint Server 2010 SP1, Word Web App 2010 SP1 in Office Web Apps 2010, Word 2003 SP3, Word 2007 SP3, Word 2010 SP1, Office Compatibility Pack SP3, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3847, CVE-2013-3849, and CVE-2013-3858. |
CVE-2013-3850 | Microsoft Word 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability." |
CVE-2013-3852 | Microsoft Word 2003 SP3, 2007 SP3, and 2010 SP1; Office Compatibility Pack SP3; and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability." |
CVE-2013-3854 | Microsoft Office 2007 SP3 and Word 2007 SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3853. |
CVE-2013-3856 | Microsoft Word 2003 SP3 and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability." |
CVE-2013-3875 | Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-3882 | Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3885. |
CVE-2013-3891 | Microsoft Word 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability." |
CVE-2013-3906 | GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013. |
CVE-2013-3914 | Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-3916 | Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3912. |
CVE-2013-3934 | Stack-based buffer overflow in Kingsoft Writer 2012 8.1.0.3030, as used in Kingsoft Office 2013 before 9.1.0.4256, allows remote attackers to execute arbitrary code via a long font name in a WPS file. |
CVE-2013-4798 | Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1705. |
CVE-2013-5047 | Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-5048. |
CVE-2013-5048 | Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-5047. |
CVE-2013-5049 | Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-5051 | Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2013-5324 | Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-3363. |
CVE-2013-5325 | Adobe Reader and Acrobat 11.x before 11.0.05 on Windows allow remote attackers to execute arbitrary JavaScript code in a javascript: URL via a crafted PDF document. |
CVE-2013-5330 | Adobe Flash Player before 11.7.700.252 and 11.8.x and 11.9.x before 11.9.900.152 on Windows and Mac OS X and before 11.2.202.327 on Linux, Adobe AIR before 3.9.0.1210, Adobe AIR SDK before 3.9.0.1210, and Adobe AIR SDK & Compiler before 3.9.0.1210 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5329. |
CVE-2013-5331 | Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK & Compiler before 3.9.0.1380 allow remote attackers to execute arbitrary code via crafted .swf content that leverages an unspecified "type confusion," as exploited in the wild in December 2013. |
CVE-2013-5332 | Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK & Compiler before 3.9.0.1380 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. |
CVE-2013-6877 | Heap-based buffer overflow in RealNetworks RealPlayer before 17.0.4.61 on Windows, and Mac RealPlayer before 12.0.1.1738, allows remote attackers to execute arbitrary code via a long string in the TRACKID element of an RMP file, a different vulnerability than CVE-2013-7260. |
CVE-2013-7331 | The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014. |
CVE-2014-0269 | |
CVE-2014-0270 | |
CVE-2014-0274 | |
CVE-2014-0275 | |
CVE-2014-0277 | |
CVE-2014-0278 | |
CVE-2014-0279 | |
CVE-2014-0280 | |
CVE-2014-0281 | |
CVE-2014-0282 | |
CVE-2014-0283 | |
CVE-2014-0284 | |
CVE-2014-0285 | |
CVE-2014-0286 | |
CVE-2014-0287 | |
CVE-2014-0288 | |
CVE-2014-0290 | |
CVE-2014-0297 | |
CVE-2014-0298 | |
CVE-2014-0299 | |
CVE-2014-0302 | |
CVE-2014-0304 | |
CVE-2014-0305 | |
CVE-2014-0306 | |
CVE-2014-0309 | |
CVE-2014-0310 | |
CVE-2014-0311 | |
CVE-2014-0312 | |
CVE-2014-0313 | |
CVE-2014-0314 | |
CVE-2014-0322 | |
CVE-2014-0324 | |
CVE-2014-0456 | Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot. |
CVE-2014-0457 | Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. |
CVE-2014-0492 | |
CVE-2014-0493 | |
CVE-2014-0495 | |
CVE-2014-0497 | |
CVE-2014-0498 | |
CVE-2014-0502 | |
CVE-2014-0506 | |
CVE-2014-0507 | |
CVE-2014-0510 | |
CVE-2014-0512 | |
CVE-2014-0515 | |
CVE-2014-0520 | |
CVE-2014-0522 | |
CVE-2014-0523 | |
CVE-2014-0524 | |
CVE-2014-0525 | |
CVE-2014-0526 | |
CVE-2014-0527 | |
CVE-2014-0533 | |
CVE-2014-0536 | |
CVE-2014-0538 | |
CVE-2014-0540 | |
CVE-2014-0543 | |
CVE-2014-0544 | |
CVE-2014-0550 | |
CVE-2014-0554 | |
CVE-2014-0555 | |
CVE-2014-0556 | |
CVE-2014-0557 | |
CVE-2014-0558 | |
CVE-2014-0559 | |
CVE-2014-0564 | |
CVE-2014-0565 | |
CVE-2014-0567 | |
CVE-2014-0569 | |
CVE-2014-0576 | |
CVE-2014-0577 | |
CVE-2014-0581 | |
CVE-2014-0584 | |
CVE-2014-0585 | |
CVE-2014-0586 | |
CVE-2014-0589 | |
CVE-2014-1563 | |
CVE-2014-1751 | |
CVE-2014-1753 | |
CVE-2014-1755 | |
CVE-2014-1765 | |
CVE-2014-1772 | |
CVE-2014-1776 | |
CVE-2014-1785 | |
CVE-2014-1791 | |
CVE-2014-1797 | |
CVE-2014-1800 | |
CVE-2014-1802 | |
CVE-2014-1804 | |
CVE-2014-1805 | |
CVE-2014-1815 | |
CVE-2014-2299 | |
CVE-2014-2782 | |
CVE-2014-2787 | |
CVE-2014-2797 | |
CVE-2014-2799 | |
CVE-2014-2823 | |
CVE-2014-2824 | |
CVE-2014-4050 | |
CVE-2014-4057 | |
CVE-2014-4063 | |
CVE-2014-4073 | |
CVE-2014-4080 | |
CVE-2014-4081 | |
CVE-2014-4082 | |
CVE-2014-4084 | |
CVE-2014-4087 | |
CVE-2014-4088 | |
CVE-2014-4092 | |
CVE-2014-4095 | |
CVE-2014-4117 | |
CVE-2014-4118 | |
CVE-2014-4126 | |
CVE-2014-4127 | |
CVE-2014-4129 | |
CVE-2014-4132 | |
CVE-2014-4133 | |
CVE-2014-4134 | |
CVE-2014-4137 | |
CVE-2014-4138 | |
CVE-2014-4141 | |
CVE-2014-4143 | |
CVE-2014-4148 | |
CVE-2014-4149 | |
CVE-2014-6327 | |
CVE-2014-6330 | |
CVE-2014-6332 | |
CVE-2014-6335 | |
CVE-2014-6337 | |
CVE-2014-6341 | |
CVE-2014-6342 | |
CVE-2014-6344 | |
CVE-2014-6347 | |
CVE-2014-6348 | |
CVE-2014-6351 | |
CVE-2014-6352 | |
CVE-2014-6353 | |
CVE-2014-6356 | |
CVE-2014-6360 | |
CVE-2014-6361 | |
CVE-2014-6366 | |
CVE-2014-6369 | |
CVE-2014-6374 | |
CVE-2014-6375 | |
CVE-2014-7169 | |
CVE-2014-7187 | |
CVE-2014-8439 | |
CVE-2014-8440 | |
CVE-2014-8441 | |
CVE-2014-8446 | |
CVE-2014-8449 | |
CVE-2014-8459 | |
CVE-2014-8460 | |
CVE-2014-8966 | |
CVE-2014-9158 | |
CVE-2014-9161 | |
CVE-2014-9163 | |
CVE-2014-9165 | |
CVE-2014-9208 | |
CVE-2015-0017 | |
CVE-2015-0018 | |
CVE-2015-0019 | |
CVE-2015-0020 | |
CVE-2015-0022 | |
CVE-2015-0023 | |
CVE-2015-0026 | |
CVE-2015-0030 | |
CVE-2015-0031 | |
CVE-2015-0035 | |
CVE-2015-0036 | |
CVE-2015-0038 | |
CVE-2015-0039 | |
CVE-2015-0040 | |
CVE-2015-0042 | |
CVE-2015-0044 | |
CVE-2015-0045 | |
CVE-2015-0046 | |
CVE-2015-0048 | |
CVE-2015-0049 | |
CVE-2015-0056 | |
CVE-2015-0064 | |
CVE-2015-0068 | |
CVE-2015-0081 | |
CVE-2015-0085 | |
CVE-2015-0086 | |
CVE-2015-0090 | |
CVE-2015-0092 | |
CVE-2015-0093 | |
CVE-2015-0099 | |
CVE-2015-0100 | |
CVE-2015-0135 | |
CVE-2015-0235 | Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST." |
CVE-2015-0305 | |
CVE-2015-0306 | |
CVE-2015-0308 | |
CVE-2015-0309 | |
CVE-2015-0310 | |
CVE-2015-0311 | |
CVE-2015-0313 | |
CVE-2015-0314 | |
CVE-2015-0318 | |
CVE-2015-0319 | |
CVE-2015-0320 | |
CVE-2015-0321 | |
CVE-2015-0322 | |
CVE-2015-0323 | |
CVE-2015-0324 | |
CVE-2015-0326 | |
CVE-2015-0327 | |
CVE-2015-0329 | |
CVE-2015-0330 | |
CVE-2015-0332 | |
CVE-2015-0333 | |
CVE-2015-0334 | |
CVE-2015-0335 | |
CVE-2015-0336 | |
CVE-2015-0338 | |
CVE-2015-0339 | |
CVE-2015-0341 | |
CVE-2015-0346 | |
CVE-2015-0347 | |
CVE-2015-0348 | |
CVE-2015-0349 | |
CVE-2015-0350 | |
CVE-2015-0351 | |
CVE-2015-0352 | |
CVE-2015-0353 | |
CVE-2015-0354 | |
CVE-2015-0356 | |
CVE-2015-0358 | |
CVE-2015-0359 | |
CVE-2015-1622 | |
CVE-2015-1623 | |
CVE-2015-1624 | |
CVE-2015-1625 | |
CVE-2015-1641 | |
CVE-2015-1642 | |
CVE-2015-1649 | |
CVE-2015-1650 | |
CVE-2015-1651 | |
CVE-2015-1652 | |
CVE-2015-1657 | |
CVE-2015-1658 | |
CVE-2015-1659 | |
CVE-2015-1660 | |
CVE-2015-1662 | |
CVE-2015-1665 | |
CVE-2015-1666 | |
CVE-2015-1667 | |
CVE-2015-1668 | |
CVE-2015-1671 | |
CVE-2015-1673 | |
CVE-2015-1675 | |
CVE-2015-1682 | |
CVE-2015-1687 | |
CVE-2015-1689 | |
CVE-2015-1691 | |
CVE-2015-1695 | |
CVE-2015-1696 | |
CVE-2015-1697 | |
CVE-2015-1698 | |
CVE-2015-1699 | |
CVE-2015-1705 | |
CVE-2015-1706 | |
CVE-2015-1708 | |
CVE-2015-1710 | |
CVE-2015-1712 | |
CVE-2015-1714 | |
CVE-2015-1717 | |
CVE-2015-1718 | |
CVE-2015-1728 | |
CVE-2015-1731 | |
CVE-2015-1732 | |
CVE-2015-1733 | |
CVE-2015-1736 | |
CVE-2015-1737 | |
CVE-2015-1738 | |
CVE-2015-1740 | |
CVE-2015-1741 | |
CVE-2015-1742 | |
CVE-2015-1747 | |
CVE-2015-1750 | |
CVE-2015-1751 | |
CVE-2015-1752 | |
CVE-2015-1753 | |
CVE-2015-1755 | |
CVE-2015-1759 | |
CVE-2015-1760 | |
CVE-2015-1766 | |
CVE-2015-1767 | |
CVE-2015-1770 | |
CVE-2015-1903 | |
CVE-2015-2372 | |
CVE-2015-2376 | |
CVE-2015-2377 | |
CVE-2015-2380 | |
CVE-2015-2383 | |
CVE-2015-2384 | |
CVE-2015-2388 | |
CVE-2015-2397 | |
CVE-2015-2401 | |
CVE-2015-2403 | |
CVE-2015-2404 | |
CVE-2015-2406 | |
CVE-2015-2408 | |
CVE-2015-2415 | |
CVE-2015-2422 | |
CVE-2015-2426 | |
CVE-2015-2431 | |
CVE-2015-2432 | |
CVE-2015-2435 | |
CVE-2015-2442 | |
CVE-2015-2444 | |
CVE-2015-2446 | |
CVE-2015-2450 | |
CVE-2015-2451 | |
CVE-2015-2455 | |
CVE-2015-2458 | |
CVE-2015-2459 | |
CVE-2015-2460 | |
CVE-2015-2461 | |
CVE-2015-2462 | |
CVE-2015-2463 | |
CVE-2015-2464 | |
CVE-2015-2467 | |
CVE-2015-2468 | |
CVE-2015-2469 | |
CVE-2015-2470 | |
CVE-2015-2477 | |
CVE-2015-2478 | |
CVE-2015-2482 | |
CVE-2015-2485 | |
CVE-2015-2486 | |
CVE-2015-2488 | |
CVE-2015-2490 | |
CVE-2015-2491 | |
CVE-2015-2492 | |
CVE-2015-2493 | |
CVE-2015-2498 | |
CVE-2015-2499 | |
CVE-2015-2500 | |
CVE-2015-2501 | |
CVE-2015-2502 | |
CVE-2015-2504 | |
CVE-2015-2506 | |
CVE-2015-2510 | |
CVE-2015-2513 | |
CVE-2015-2515 | |
CVE-2015-2520 | |
CVE-2015-2521 | |
CVE-2015-2523 | |
CVE-2015-2545 | |
CVE-2015-2548 | |
CVE-2015-2555 | |
CVE-2015-2557 | |
CVE-2015-3038 | |
CVE-2015-3041 | |
CVE-2015-3042 | |
CVE-2015-3043 | |
CVE-2015-3046 | |
CVE-2015-3048 | |
CVE-2015-3050 | |
CVE-2015-3051 | |
CVE-2015-3052 | |
CVE-2015-3053 | |
CVE-2015-3054 | |
CVE-2015-3056 | |
CVE-2015-3057 | |
CVE-2015-3059 | |
CVE-2015-3070 | |
CVE-2015-3072 | |
CVE-2015-3074 | |
CVE-2015-3075 | |
CVE-2015-3077 | |
CVE-2015-3078 | |
CVE-2015-3081 | |
CVE-2015-3084 | |
CVE-2015-3086 | |
CVE-2015-3087 | |
CVE-2015-3088 | |
CVE-2015-3089 | |
CVE-2015-3090 | |
CVE-2015-3093 | |
CVE-2015-3100 | |
CVE-2015-3103 | |
CVE-2015-3104 | |
CVE-2015-3105 | |
CVE-2015-3106 | |
CVE-2015-3117 | |
CVE-2015-3118 | |
CVE-2015-3119 | |
CVE-2015-3120 | |
CVE-2015-3121 | |
CVE-2015-3123 | |
CVE-2015-3127 | |
CVE-2015-3128 | |
CVE-2015-3129 | |
CVE-2015-3130 | |
CVE-2015-3788 | |
CVE-2015-4430 | |
CVE-2015-4433 | |
CVE-2015-4435 | |
CVE-2015-4438 | |
CVE-2015-4441 | |
CVE-2015-4447 | |
CVE-2015-4448 | |
CVE-2015-5093 | |
CVE-2015-5094 | |
CVE-2015-5095 | |
CVE-2015-5096 | |
CVE-2015-5097 | |
CVE-2015-5098 | |
CVE-2015-5099 | |
CVE-2015-5113 | |
CVE-2015-5122 | Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015. |
CVE-2015-5123 | |
CVE-2015-5125 | |
CVE-2015-5126 | |
CVE-2015-5127 | |
CVE-2015-5131 | |
CVE-2015-5133 | |
CVE-2015-5134 | |
CVE-2015-5539 | |
CVE-2015-5541 | |
CVE-2015-5543 | |
CVE-2015-5544 | |
CVE-2015-5545 | |
CVE-2015-5546 | |
CVE-2015-5547 | |
CVE-2015-5548 | |
CVE-2015-5549 | |
CVE-2015-5553 | |
CVE-2015-5554 | |
CVE-2015-5555 | |
CVE-2015-5556 | |
CVE-2015-5557 | |
CVE-2015-5558 | |
CVE-2015-5559 | |
CVE-2015-5560 | |
CVE-2015-5561 | |
CVE-2015-5562 | |
CVE-2015-5563 | |
CVE-2015-5564 | |
CVE-2015-5565 | |
CVE-2015-5566 | |
CVE-2015-5567 | |
CVE-2015-5568 | |
CVE-2015-5570 | |
CVE-2015-5573 | |
CVE-2015-5575 | |
CVE-2015-5579 | |
CVE-2015-5580 | |
CVE-2015-5581 | |
CVE-2015-5582 | |
CVE-2015-5584 | |
CVE-2015-5587 | |
CVE-2015-5588 | |
CVE-2015-6040 | |
CVE-2015-6042 | Use-after-free vulnerability in the CWindow object implementation in Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." |
CVE-2015-6045 | |
CVE-2015-6048 | Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6049. |
CVE-2015-6049 | |
CVE-2015-6050 | |
CVE-2015-6055 | |
CVE-2015-6064 | |
CVE-2015-6065 | |
CVE-2015-6066 | |
CVE-2015-6068 | |
CVE-2015-6070 | |
CVE-2015-6071 | |
CVE-2015-6072 | |
CVE-2015-6073 | |
CVE-2015-6075 | |
CVE-2015-6076 | |
CVE-2015-6077 | |
CVE-2015-6078 | |
CVE-2015-6079 | |
CVE-2015-6080 | |
CVE-2015-6081 | |
CVE-2015-6087 | |
CVE-2015-6091 | |
CVE-2015-6092 | |
CVE-2015-6093 | |
CVE-2015-6094 | |
CVE-2015-6096 | |
CVE-2015-6097 | |
CVE-2015-6098 | |
CVE-2015-6100 | |
CVE-2015-6101 | |
CVE-2015-6104 | |
CVE-2015-6106 | |
CVE-2015-6107 | |
CVE-2015-6109 | |
CVE-2015-6113 | |
CVE-2015-6114 | |
CVE-2015-6118 | |
CVE-2015-6122 | |
CVE-2015-6124 | |
CVE-2015-6130 | |
CVE-2015-6132 | |
CVE-2015-6134 | |
CVE-2015-6136 | |
CVE-2015-6140 | |
CVE-2015-6141 | |
CVE-2015-6142 | |
CVE-2015-6145 | |
CVE-2015-6147 | |
CVE-2015-6148 | |
CVE-2015-6149 | |
CVE-2015-6150 | |
CVE-2015-6151 | |
CVE-2015-6152 | |
CVE-2015-6153 | |
CVE-2015-6154 | |
CVE-2015-6155 | |
CVE-2015-6156 | |
CVE-2015-6157 | |
CVE-2015-6158 | |
CVE-2015-6159 | |
CVE-2015-6160 | |
CVE-2015-6162 | |
CVE-2015-6168 | |
CVE-2015-6170 | |
CVE-2015-6173 | |
CVE-2015-6174 | |
CVE-2015-6175 | |
CVE-2015-6177 | |
CVE-2015-6676 | |
CVE-2015-6678 | |
CVE-2015-6682 | |
CVE-2015-7088 | |
CVE-2015-7089 | |
CVE-2015-7625 | |
CVE-2015-7627 | |
CVE-2015-7629 | |
CVE-2015-7631 | |
CVE-2015-7633 | |
CVE-2015-7645 | |
CVE-2015-7647 | |
CVE-2015-7651 | |
CVE-2015-7652 | |
CVE-2015-7653 | |
CVE-2015-7654 | |
CVE-2015-7655 | |
CVE-2015-7659 | |
CVE-2015-7660 | |
CVE-2015-7662 | |
CVE-2015-7663 | |
CVE-2015-8042 | |
CVE-2015-8046 | |
CVE-2015-8048 | |
CVE-2015-8060 | |
CVE-2015-8396 | |
CVE-2015-8407 | |
CVE-2015-8408 | |
CVE-2015-8410 | |
CVE-2015-8412 | |
CVE-2015-8413 | |
CVE-2015-8414 | |
CVE-2015-8418 | |
CVE-2015-8419 | |
CVE-2015-8435 | |
CVE-2015-8436 | |
CVE-2015-8437 | |
CVE-2015-8438 | |
CVE-2015-8439 | |
CVE-2015-8442 | |
CVE-2015-8443 | |
CVE-2015-8445 | |
CVE-2015-8446 | |
CVE-2015-8447 | |
CVE-2015-8448 | |
CVE-2015-8449 | |
CVE-2015-8450 | |
CVE-2015-8457 | |
CVE-2015-8459 | |
CVE-2015-8460 | |
CVE-2015-8634 | |
CVE-2015-8635 | |
CVE-2015-8636 | |
CVE-2015-8638 | |
CVE-2015-8640 | |
CVE-2015-8641 | |
CVE-2015-8642 | |
CVE-2015-8643 | |
CVE-2015-8644 | |
CVE-2015-8645 | |
CVE-2015-8646 | |
CVE-2015-8648 | |
CVE-2015-8649 | |
CVE-2015-8650 | |
CVE-2015-8651 | |
CVE-2015-8655 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted MPEG-4 data, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, CVE-2015-8454, CVE-2015-8653, CVE-2015-8821, and CVE-2015-8822. |
CVE-2015-8658 | Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (uninitialized pointer dereference and memory corruption) via crafted MPEG-4 data, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8652, CVE-2015-8654, CVE-2015-8656, CVE-2015-8657, and CVE-2015-8820. |
CVE-2015-8789 | |
CVE-2016-0002 | |
CVE-2016-0003 | |
CVE-2016-0006 | |
CVE-2016-0007 | |
CVE-2016-0008 | |
CVE-2016-0010 | |
CVE-2016-0015 | |
CVE-2016-0021 | |
CVE-2016-0024 | |
CVE-2016-0025 | |
CVE-2016-0034 | |
CVE-2016-0035 | |
CVE-2016-0038 | |
CVE-2016-0040 | |
CVE-2016-0046 | |
CVE-2016-0048 | |
CVE-2016-0051 | |
CVE-2016-0052 | |
CVE-2016-0053 | |
CVE-2016-0054 | |
CVE-2016-0055 | |
CVE-2016-0056 | |
CVE-2016-0058 | |
CVE-2016-0060 | |
CVE-2016-0061 | |
CVE-2016-0062 | |
CVE-2016-0063 | |
CVE-2016-0067 | |
CVE-2016-0068 | |
CVE-2016-0071 | |
CVE-2016-0072 | |
CVE-2016-0073 | |
CVE-2016-0075 | |
CVE-2016-0079 | |
CVE-2016-0080 | |
CVE-2016-0082 | |
CVE-2016-0083 | |
CVE-2016-0087 | |
CVE-2016-0092 | |
CVE-2016-0093 | |
CVE-2016-0095 | |
CVE-2016-0096 | |
CVE-2016-0098 | |
CVE-2016-0099 | |
CVE-2016-0102 | |
CVE-2016-0103 | |
CVE-2016-0104 | |
CVE-2016-0105 | |
CVE-2016-0106 | |
CVE-2016-0108 | |
CVE-2016-0109 | |
CVE-2016-0110 | |
CVE-2016-0112 | |
CVE-2016-0118 | |
CVE-2016-0121 | |
CVE-2016-0122 | |
CVE-2016-0126 | |
CVE-2016-0134 | |
CVE-2016-0136 | |
CVE-2016-0139 | |
CVE-2016-0143 | |
CVE-2016-0145 | |
CVE-2016-0147 | |
CVE-2016-0151 | |
CVE-2016-0154 | |
CVE-2016-0155 | |
CVE-2016-0156 | |
CVE-2016-0157 | |
CVE-2016-0158 | |
CVE-2016-0159 | |
CVE-2016-0164 | |
CVE-2016-0165 | |
CVE-2016-0166 | |
CVE-2016-0167 | |
CVE-2016-0169 | |
CVE-2016-0171 | |
CVE-2016-0172 | |
CVE-2016-0173 | |
CVE-2016-0174 | |
CVE-2016-0175 | |
CVE-2016-0184 | |
CVE-2016-0185 | |
CVE-2016-0187 | |
CVE-2016-0189 | |
CVE-2016-0191 | |
CVE-2016-0192 | |
CVE-2016-0193 | |
CVE-2016-0194 | |
CVE-2016-0196 | |
CVE-2016-0199 | |
CVE-2016-0200 | |
CVE-2016-0728 | The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands. |
CVE-2016-0931 | |
CVE-2016-0933 | |
CVE-2016-0936 | |
CVE-2016-0938 | |
CVE-2016-0939 | |
CVE-2016-0940 | |
CVE-2016-0942 | |
CVE-2016-0943 | |
CVE-2016-0944 | |
CVE-2016-0945 | |
CVE-2016-0946 | |
CVE-2016-0959 | Use after free vulnerability in Adobe Flash Player Desktop Runtime before 20.0.0.267, Adobe Flash Player Extended Support Release before 18.0.0.324, Adobe Flash Player for Google Chrome before 20.0.0.267, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 before 20.0.0.267, Adobe Flash Player for Internet Explorer 10 and 11 before 20.0.0.267, Adobe Flash Player for Linux before 11.2.202.559, AIR Desktop Runtime before 20.0.0.233, AIR SDK before 20.0.0.233, AIR SDK & Compiler before 20.0.0.233, AIR for Android before 20.0.0.233. |
CVE-2016-0960 | Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005. |
CVE-2016-0961 | Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005. |
CVE-2016-0962 | Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005. |
CVE-2016-0963 | Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0993 and CVE-2016-1010. |
CVE-2016-0964 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0965 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0966 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0967 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0968 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0969 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0971 | Heap-based buffer overflow in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors. |
CVE-2016-0972 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0973 | Use-after-free vulnerability in the URLRequest object implementation in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via a URLLoader.load call, a different vulnerability than CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984. |
CVE-2016-0974 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984. |
CVE-2016-0975 | Use-after-free vulnerability in the instanceof function in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code by leveraging improper reference handling, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984. |
CVE-2016-0976 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0977 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0978 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0979 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0980, and CVE-2016-0981. |
CVE-2016-0981 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0980. |
CVE-2016-0982 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0983, and CVE-2016-0984. |
CVE-2016-0983 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0984. |
CVE-2016-0984 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983. |
CVE-2016-0985 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion." |
CVE-2016-0986 | Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005. |
CVE-2016-0987 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000. |
CVE-2016-0988 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000. |
CVE-2016-0989 | Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005. |
CVE-2016-0990 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000. |
CVE-2016-0991 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000. |
CVE-2016-0993 | Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-1010. |
CVE-2016-0995 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000. |
CVE-2016-0996 | Use-after-free vulnerability in the setInterval method in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via crafted arguments, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000. |
CVE-2016-0999 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, and CVE-2016-1000. |
CVE-2016-1006 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to bypass the ASLR protection mechanism via JIT data. |
CVE-2016-1007 | |
CVE-2016-1009 | |
CVE-2016-1010 | Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-0993. |
CVE-2016-1011 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1013, CVE-2016-1016, CVE-2016-1017, and CVE-2016-1031. |
CVE-2016-1012 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033. |
CVE-2016-1013 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1011, CVE-2016-1016, CVE-2016-1017, and CVE-2016-1031. |
CVE-2016-1015 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code by overriding NetConnection object properties to leverage an unspecified "type confusion," a different vulnerability than CVE-2016-1019. |
CVE-2016-1016 | Use-after-free vulnerability in the Transform object implementation in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via a flash.geom.Matrix callback, a different vulnerability than CVE-2016-1011, CVE-2016-1013, CVE-2016-1017, and CVE-2016-1031. |
CVE-2016-1017 | Use-after-free vulnerability in the LoadVars.decode function in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1011, CVE-2016-1013, CVE-2016-1016, and CVE-2016-1031. |
CVE-2016-1018 | Stack-based buffer overflow in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via crafted JPEG-XR data. |
CVE-2016-1019 | Adobe Flash Player 21.0.0.197 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016. |
CVE-2016-1037 | |
CVE-2016-1038 | |
CVE-2016-1039 | |
CVE-2016-1040 | |
CVE-2016-1041 | |
CVE-2016-1042 | |
CVE-2016-1044 | |
CVE-2016-1045 | |
CVE-2016-1046 | |
CVE-2016-1047 | |
CVE-2016-1048 | |
CVE-2016-1049 | |
CVE-2016-1050 | |
CVE-2016-1060 | |
CVE-2016-1061 | |
CVE-2016-1062 | |
CVE-2016-1064 | |
CVE-2016-1065 | |
CVE-2016-1066 | |
CVE-2016-1069 | |
CVE-2016-1072 | |
CVE-2016-1073 | |
CVE-2016-1075 | |
CVE-2016-1077 | |
CVE-2016-1078 | |
CVE-2016-1079 | |
CVE-2016-1080 | |
CVE-2016-1082 | |
CVE-2016-1083 | |
CVE-2016-1084 | |
CVE-2016-1085 | |
CVE-2016-1088 | |
CVE-2016-1089 | |
CVE-2016-1091 | |
CVE-2016-1092 | |
CVE-2016-1093 | |
CVE-2016-1094 | |
CVE-2016-1095 | |
CVE-2016-1096 | |
CVE-2016-1097 | |
CVE-2016-1098 | |
CVE-2016-1099 | |
CVE-2016-1100 | |
CVE-2016-1104 | |
CVE-2016-1105 | |
CVE-2016-1106 | |
CVE-2016-1107 | |
CVE-2016-1108 | |
CVE-2016-1109 | |
CVE-2016-1110 | |
CVE-2016-1111 | |
CVE-2016-1116 | |
CVE-2016-1521 | |
CVE-2016-1522 | |
CVE-2016-1681 | |
CVE-2016-2207 | |
CVE-2016-2209 | |
CVE-2016-2939 | |
CVE-2016-2946 | |
CVE-2016-3198 | |
CVE-2016-3199 | |
CVE-2016-3203 | |
CVE-2016-3205 | |
CVE-2016-3206 | |
CVE-2016-3207 | |
CVE-2016-3209 | |
CVE-2016-3211 | |
CVE-2016-3215 | |
CVE-2016-3218 | |
CVE-2016-3219 | |
CVE-2016-3220 | |
CVE-2016-3221 | |
CVE-2016-3222 | |
CVE-2016-3225 | |
CVE-2016-3233 | |
CVE-2016-3240 | |
CVE-2016-3242 | |
CVE-2016-3243 | |
CVE-2016-3246 | |
CVE-2016-3249 | |
CVE-2016-3250 | |
CVE-2016-3252 | |
CVE-2016-3254 | |
CVE-2016-3259 | |
CVE-2016-3261 | |
CVE-2016-3263 | |
CVE-2016-3264 | |
CVE-2016-3270 | |
CVE-2016-3271 | |
CVE-2016-3280 | |
CVE-2016-3281 | |
CVE-2016-3282 | |
CVE-2016-3284 | |
CVE-2016-3286 | |
CVE-2016-3288 | |
CVE-2016-3289 | |
CVE-2016-3290 | |
CVE-2016-3293 | |
CVE-2016-3297 | |
CVE-2016-3303 | |
CVE-2016-3306 | |
CVE-2016-3308 | |
CVE-2016-3309 | |
CVE-2016-3310 | |
CVE-2016-3311 | |
CVE-2016-3313 | |
CVE-2016-3317 | |
CVE-2016-3318 | |
CVE-2016-3322 | |
CVE-2016-3326 | |
CVE-2016-3327 | |
CVE-2016-3331 | |
CVE-2016-3343 | |
CVE-2016-3348 | |
CVE-2016-3353 | |
CVE-2016-3355 | |
CVE-2016-3358 | |
CVE-2016-3359 | |
CVE-2016-3360 | |
CVE-2016-3362 | |
CVE-2016-3363 | |
CVE-2016-3365 | |
CVE-2016-3369 | |
CVE-2016-3371 | |
CVE-2016-3373 | |
CVE-2016-3376 | |
CVE-2016-3377 | |
CVE-2016-3381 | |
CVE-2016-3383 | |
CVE-2016-3385 | |
CVE-2016-3386 | |
CVE-2016-3387 | |
CVE-2016-3388 | |
CVE-2016-3593 | |
CVE-2016-3645 | |
CVE-2016-3646 | |
CVE-2016-3653 | |
CVE-2016-4108 | |
CVE-2016-4121 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows and OS X and before 11.2.202.621 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1097, CVE-2016-1106, CVE-2016-1107, CVE-2016-1108, CVE-2016-1109, CVE-2016-1110, CVE-2016-4108, and CVE-2016-4110. |
CVE-2016-4136 | |
CVE-2016-4139 | |
CVE-2016-4141 | |
CVE-2016-4142 | |
CVE-2016-4143 | |
CVE-2016-4144 | |
CVE-2016-4146 | |
CVE-2016-4147 | |
CVE-2016-4148 | |
CVE-2016-4149 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. |
CVE-2016-4150 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. |
CVE-2016-4151 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. |
CVE-2016-4152 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. |
CVE-2016-4153 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. |
CVE-2016-4154 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. |
CVE-2016-4155 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. |
CVE-2016-4156 | |
CVE-2016-4171 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016. |
CVE-2016-4173 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248. |
CVE-2016-4174 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248. |
CVE-2016-4175 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246. |
CVE-2016-4176 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4177. |
CVE-2016-4177 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4176. |
CVE-2016-4178 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors. |
CVE-2016-4179 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246. |
CVE-2016-4182 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246. |
CVE-2016-4185 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246. |
CVE-2016-4188 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246. |
CVE-2016-4191 | |
CVE-2016-4192 | |
CVE-2016-4201 | |
CVE-2016-4202 | |
CVE-2016-4203 | |
CVE-2016-4204 | |
CVE-2016-4205 | |
CVE-2016-4206 | |
CVE-2016-4207 | |
CVE-2016-4222 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248. |
CVE-2016-4223 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4224 and CVE-2016-4225. |
CVE-2016-4224 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4223 and CVE-2016-4225. |
CVE-2016-4225 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4223 and CVE-2016-4224. |
CVE-2016-4226 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248. |
CVE-2016-4227 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248. |
CVE-2016-4228 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248. |
CVE-2016-4229 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248. |
CVE-2016-4230 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4231, and CVE-2016-4248. |
CVE-2016-4231 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, and CVE-2016-4248. |
CVE-2016-4232 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to obtain sensitive information from process memory via unspecified vectors. |
CVE-2016-4249 | Heap-based buffer overflow in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors. |
CVE-2016-4251 | |
CVE-2016-4252 | |
CVE-2016-4255 | |
CVE-2016-4271 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4277 and CVE-2016-4278, aka a "local-with-filesystem Flash sandbox bypass" issue. |
CVE-2016-4272 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932. |
CVE-2016-4274 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. |
CVE-2016-4276 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. |
CVE-2016-4280 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. |
CVE-2016-4283 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. |
CVE-2016-4285 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-6922, and CVE-2016-6924. |
CVE-2016-4298 | |
CVE-2016-4304 | |
CVE-2016-4305 | |
CVE-2016-4324 | |
CVE-2016-4333 | |
CVE-2016-4637 | |
CVE-2016-5195 | Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW." |
CVE-2016-6940 | |
CVE-2016-6942 | |
CVE-2016-6943 | |
CVE-2016-6945 | |
CVE-2016-6948 | |
CVE-2016-6949 | |
CVE-2016-6950 | |
CVE-2016-6952 | |
CVE-2016-6953 | |
CVE-2016-6954 | |
CVE-2016-6956 | |
CVE-2016-6961 | |
CVE-2016-6962 | |
CVE-2016-6963 | |
CVE-2016-6964 | |
CVE-2016-6965 | |
CVE-2016-6970 | |
CVE-2016-6978 | |
CVE-2016-6979 | |
CVE-2016-6981 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-6987. |
CVE-2016-6982 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990. |
CVE-2016-6983 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990. |
CVE-2016-6984 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990. |
CVE-2016-6985 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990. |
CVE-2016-6986 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6989, and CVE-2016-6990. |
CVE-2016-6987 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-6981. |
CVE-2016-6988 | |
CVE-2016-7182 | |
CVE-2016-7184 | |
CVE-2016-7185 | |
CVE-2016-7188 | |
CVE-2016-7189 | |
CVE-2016-7193 | |
CVE-2016-7194 | |
CVE-2016-7196 | |
CVE-2016-7198 | |
CVE-2016-7200 | |
CVE-2016-7203 | |
CVE-2016-7205 | |
CVE-2016-7210 | |
CVE-2016-7211 | |
CVE-2016-7212 | |
CVE-2016-7213 | |
CVE-2016-7214 | |
CVE-2016-7215 | |
CVE-2016-7217 | |
CVE-2016-7219 | |
CVE-2016-7222 | |
CVE-2016-7226 | |
CVE-2016-7228 | |
CVE-2016-7229 | |
CVE-2016-7230 | |
CVE-2016-7231 | |
CVE-2016-7232 | |
CVE-2016-7233 | |
CVE-2016-7234 | |
CVE-2016-7235 | |
CVE-2016-7236 | |
CVE-2016-7242 | |
CVE-2016-7246 | |
CVE-2016-7255 | |
CVE-2016-7257 | |
CVE-2016-7260 | |
CVE-2016-7262 | |
CVE-2016-7264 | |
CVE-2016-7265 | |
CVE-2016-7268 | |
CVE-2016-7272 | |
CVE-2016-7274 | |
CVE-2016-7276 | |
CVE-2016-7277 | |
CVE-2016-7279 | |
CVE-2016-7282 | |
CVE-2016-7283 | |
CVE-2016-7286 | |
CVE-2016-7289 | |
CVE-2016-7292 | |
CVE-2016-7295 | |
CVE-2016-7296 | |
CVE-2016-7297 | |
CVE-2016-7799 | |
CVE-2016-7855 | |
CVE-2016-7857 | |
CVE-2016-7858 | |
CVE-2016-7859 | |
CVE-2016-7860 | |
CVE-2016-7862 | |
CVE-2016-7863 | |
CVE-2016-7864 | |
CVE-2016-7865 | |
CVE-2016-7871 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Worker class. Successful exploitation could lead to arbitrary code execution. |
CVE-2016-7873 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the PSDK class related to ad policy functionality method. Successful exploitation could lead to arbitrary code execution. |
CVE-2016-7874 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the NetConnection class when handling the proxy types. Successful exploitation could lead to arbitrary code execution. |
CVE-2016-7875 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable integer overflow vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution. |
CVE-2016-7879 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the NetConnection class when handling an attached script object. Successful exploitation could lead to arbitrary code execution. |
CVE-2016-8382 | An exploitable heap corruption vulnerability exists in the Doc_SetSummary functionality of AntennaHouse DMC HTMLFilter. A specially crafted doc file can cause a heap corruption resulting in arbitrary code execution. An attacker can send a malicious doc file to trigger this vulnerability. |
CVE-2016-8383 | An exploitable heap corruption vulnerability exists in the Doc_GetFontTable functionality of AntennaHouse DMC HTMLFilter. A specially crafted doc file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious doc file to trigger this vulnerability. |
CVE-2016-8384 | An exploitable heap corruption vulnerability exists in the DHFSummary functionality of AntennaHouse DMC HTMLFilter. |
CVE-2016-8385 | An exploitable uninitialized variable vulnerability which leads to a stack-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF to XML a stack variable will be left uninitialized which will later be used to fetch a length that is used in a copy operation. In most cases this will allow an aggressor to write outside the bounds of a stack buffer which is used to contain colors. This can lead to code execution under the context of the account running the tool. |
CVE-2016-8707 | An exploitable out of bounds write exists in the handling of compressed TIFF images in ImageMagicks's convert utility. A crafted TIFF document can lead to an out of bounds write which in particular circumstances could be leveraged into remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality. |
CVE-2016-8709 | A remote out of bound write / memory corruption vulnerability exists in the PDF parsing functionality of Nitro Pro 10. A specially crafted PDF file can cause a vulnerability resulting in potential memory corruption. An attacker can send the victim a specific PDF file to trigger this vulnerability. |
CVE-2016-8710 | An exploitable heap write out of bounds vulnerability exists in the decoding of BPG images in Libbpg library. A crafted BPG image decoded by libbpg can cause an integer underflow vulnerability causing an out of bounds heap write leading to remote code execution. This vulnerability can be triggered via attempting to decode a crafted BPG image using Libbpg. |
CVE-2016-8713 | A remote out of bound write / memory corruption vulnerability exists in the PDF parsing functionality of Nitro Pro 10.5.9.9. A specially crafted PDF file can cause a vulnerability resulting in potential memory corruption. An attacker can send the victim a specific PDF file to trigger this vulnerability. |
CVE-2016-8729 | An exploitable memory corruption vulnerability exists in the JBIG2 parser of Artifex MuPDF 1.9. A specially crafted PDF can cause a negative number to be passed to a memset resulting in memory corruption and potential code execution. An attacker can specially craft a PDF and send to the victim to trigger this vulnerability. |
CVE-2016-8730 | An of bound write / memory corruption vulnerability exists in the GIF parsing functionality of Core PHOTO-PAINT X8 18.1.0.661. A specially crafted GIF file can cause a vulnerability resulting in potential memory corruption resulting in code execution. An attacker can send the victim a specific GIF file to trigger this vulnerability. |
CVE-2016-8732 | Multiple security flaws exists in InvProtectDrv.sys which is a part of Invincea Dell Protected Workspace 5.1.1-22303. Weak restrictions on the driver communication channel and additional insufficient checks allow any application to turn off some of the protection mechanisms provided by the Invincea product. |
CVE-2016-8823 | |
CVE-2016-9031 | An exploitable integer overflow exists in the Joyent SmartOS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFS_ADD_ENTRIES when dealing with 32-bit file systems. An attacker can craft an input that can cause a kernel panic and potentially be leveraged into a full privilege escalation vulnerability. This vulnerability is distinct from CVE-2016-8733. |
CVE-2016-9034 | An exploitable buffer overflow exists in the Joyent SmartOS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFS_ADD_ENTRIES when dealing with 32-bit file systems. An attacker can craft an input that can cause a buffer overflow in the nm variable leading to an out of bounds memory access and could result in potential privilege escalation. This vulnerability is distinct from CVE-2016-9032. |
CVE-2016-9035 | An exploitable buffer overflow exists in the Joyent SmartOS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFS_ADD_ENTRIES when dealing with native file systems. An attacker can craft an input that can cause a buffer overflow in the path variable leading to an out of bounds memory access and could result in potential privilege escalation. This vulnerability is distinct from CVE-2016-9033. |
CVE-2016-9038 | An exploitable double fetch vulnerability exists in the SboxDrv.sys driver functionality of Invincea-X 6.1.3-24058. A specially crafted input buffer and race condition can result in kernel memory corruption, which could result in privilege escalation. An attacker needs to execute a special application locally to trigger this vulnerability. |
CVE-2016-9040 | An exploitable denial of service exists in the the Joyent SmartOS OS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFSADDENTRIES when used with a 32 bit model. An attacker can cause a buffer to be allocated and never freed. When repeatedly exploit this will result in memory exhaustion, resulting in a full system denial of service. |
CVE-2016-9043 | An out of bound write vulnerability exists in the EMF parsing functionality of CorelDRAW X8 (CdrGfx - Corel Graphics Engine (64-Bit) - 18.1.0.661). A specially crafted EMF file can cause a vulnerability resulting in potential code execution. An attacker can send the victim a specific EMF file to trigger this vulnerability. |
CVE-2016-9949 | |
CVE-2017-0003 | |
CVE-2017-0006 | |
CVE-2017-0007 | |
CVE-2017-0009 | |
CVE-2017-0011 | |
CVE-2017-0018 | |
CVE-2017-0019 | |
CVE-2017-0020 | |
CVE-2017-0023 | |
CVE-2017-0026 | |
CVE-2017-0032 | |
CVE-2017-0033 | |
CVE-2017-0037 | |
CVE-2017-0040 | |
CVE-2017-0046 | |
CVE-2017-0047 | |
CVE-2017-0052 | |
CVE-2017-0056 | |
CVE-2017-0060 | The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062. |
CVE-2017-0064 | |
CVE-2017-0065 | |
CVE-2017-0066 | |
CVE-2017-0070 | |
CVE-2017-0071 | |
CVE-2017-0072 | |
CVE-2017-0073 | The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Windows GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062. |
CVE-2017-0077 | |
CVE-2017-0079 | |
CVE-2017-0082 | |
CVE-2017-0083 | |
CVE-2017-0086 | |
CVE-2017-0087 | |
CVE-2017-0088 | |
CVE-2017-0089 | |
CVE-2017-0090 | |
CVE-2017-0103 | |
CVE-2017-0106 | |
CVE-2017-0108 | |
CVE-2017-0121 | |
CVE-2017-0130 | |
CVE-2017-0131 | |
CVE-2017-0133 | |
CVE-2017-0141 | |
CVE-2017-0155 | |
CVE-2017-0156 | |
CVE-2017-0158 | |
CVE-2017-0160 | |
CVE-2017-0165 | |
CVE-2017-0189 | |
CVE-2017-0192 | |
CVE-2017-0194 | |
CVE-2017-0199 | |
CVE-2017-0200 | |
CVE-2017-0201 | |
CVE-2017-0202 | |
CVE-2017-0204 | |
CVE-2017-0205 | |
CVE-2017-0210 | |
CVE-2017-0211 | |
CVE-2017-0215 | |
CVE-2017-0220 | |
CVE-2017-0227 | |
CVE-2017-0228 | |
CVE-2017-0234 | |
CVE-2017-0240 | |
CVE-2017-0243 | |
CVE-2017-0245 | |
CVE-2017-0246 | |
CVE-2017-0250 | |
CVE-2017-0259 | |
CVE-2017-0261 | |
CVE-2017-0290 | |
CVE-2017-2374 | |
CVE-2017-2775 | An exploitable memory corruption vulnerability exists in the LvVariantUnflatten functionality in 64-bit versions of LabVIEW before 2015 SP1 f7 Patch and 2016 before f2 Patch. A specially crafted VI file can cause a user controlled value to be used as a loop terminator resulting in internal heap corruption. An attacker controlled VI file can be used to trigger this vulnerability, exploitation could lead to remote code execution. |
CVE-2017-2789 | When copying filedata into a buffer, JustSystems Ichitaro Office 2016 Trial will calculate two values to determine how much data to copy from the document. If both of these values are larger than the size of the buffer, the application will choose the smaller of the two and trust it to copy data from the file. This value is larger than the buffer size, which leads to a heap-based buffer overflow. This overflow corrupts an offset in the heap used in pointer arithmetic for writing data and can lead to code execution under the context of the application. |
CVE-2017-2799 | An exploitable heap corruption vulnerability exists in the AddSst functionality of Antenna House DMC HTMLFilter as used by MarkLogic 8.0-6. A specially crafted XLS file can cause a heap corruption resulting in arbitrary code execution. An attacker can send or provide a malicious XLS file to trigger this vulnerability. |
CVE-2017-2810 | An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability. |
CVE-2017-2813 | An exploitable integer overflow vulnerability exists in the JPEG 2000 parser functionality of IrfanView 4.44. A specially crafted jpeg2000 image can cause an integer overflow leading to wrong memory allocation resulting in arbitrary code execution. Vulnerability can be triggered by viewing the image in via the application or by using thumbnailing feature of IrfanView. |
CVE-2017-2819 | An exploitable heap-based buffer overflow exists in the Hangul Word Processor component (version 9.6.1.4350) of Hancom Thinkfree Office NEO 9.6.1.4902. A specially crafted document stream can cause an integer underflow resulting in a buffer overflow which can lead to code execution under the context of the application. An attacker can entice a user to open up a document in order to trigger this vulnerability. |
CVE-2017-2926 | Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to processing of atoms in MP4 files. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2927 | Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2928 | Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to setting visual mode effects. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2930 | Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability due to a concurrency error when manipulating a display list. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2933 | Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability related to texture compression. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2934 | Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when parsing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2936 | Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2937 | Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class, when using class inheritance. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2947 | |
CVE-2017-2948 | |
CVE-2017-2950 | |
CVE-2017-2951 | |
CVE-2017-2957 | |
CVE-2017-2958 | |
CVE-2017-2961 | |
CVE-2017-2963 | |
CVE-2017-2965 | |
CVE-2017-2966 | |
CVE-2017-2967 | |
CVE-2017-2984 | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable heap overflow vulnerability in the h264 decoder routine. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2988 | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability when performing garbage collection. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2990 | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in the h264 decompression routine. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2991 | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in the h264 codec (related to decompression). Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2992 | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable heap overflow vulnerability when parsing an MP4 header. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2993 | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable use after free vulnerability related to event handlers. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2994 | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable use after free vulnerability in Primetime SDK event dispatch. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2995 | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable type confusion vulnerability related to the MessageChannel class. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2996 | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in Primetime SDK. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2997 | Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable buffer overflow / underflow vulnerability in the Primetime TVSDK that supports customizing ad information. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2998 | Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK API functionality related to timeline interactions. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-2999 | Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK functionality related to hosting playback surface. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3001 | Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to garbage collection in the ActionScript 2 VM. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3002 | Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability in the ActionScript2 TextField object related to the variable property. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3003 | Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to an interaction between the privacy user interface and the ActionScript 2 Camera object. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3014 | |
CVE-2017-3017 | |
CVE-2017-3019 | |
CVE-2017-3020 | |
CVE-2017-3022 | |
CVE-2017-3024 | |
CVE-2017-3025 | |
CVE-2017-3026 | |
CVE-2017-3030 | |
CVE-2017-3042 | |
CVE-2017-3045 | |
CVE-2017-3050 | |
CVE-2017-3051 | |
CVE-2017-3055 | |
CVE-2017-3056 | |
CVE-2017-3057 | |
CVE-2017-3060 | |
CVE-2017-3062 | |
CVE-2017-3063 | |
CVE-2017-3064 | |
CVE-2017-3068 | Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Advanced Video Coding engine. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3069 | Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BlendMode class. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3070 | Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the ConvolutionFilter class. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3071 | Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when masking display objects. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3072 | Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3073 | Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when handling multiple mask properties of display objects, aka memory corruption. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3074 | Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Graphics class. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3075 | |
CVE-2017-3076 | |
CVE-2017-3078 | |
CVE-2017-3079 | |
CVE-2017-3080 | Adobe Flash Player versions 26.0.0.131 and earlier have a security bypass vulnerability related to the Flash API used by Internet Explorer. Successful exploitation could lead to information disclosure. |
CVE-2017-3081 | |
CVE-2017-3082 | |
CVE-2017-3083 | |
CVE-2017-3084 | |
CVE-2017-3085 | Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing URL redirect. |
CVE-2017-3099 | Adobe Flash Player versions 26.0.0.131 and earlier have an exploitable memory corruption vulnerability in the Action Script 3 raster data model. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3100 | Adobe Flash Player versions 26.0.0.131 and earlier have an exploitable memory corruption vulnerability in the Action Script 2 BitmapData class. Successful exploitation could lead to memory address disclosure. |
CVE-2017-3106 | Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion vulnerability when parsing SWF files. Successful exploitation could lead to arbitrary code execution. |
CVE-2017-3112 | |
CVE-2017-3113 | |
CVE-2017-3114 | |
CVE-2017-3120 | |
CVE-2017-3121 | |
CVE-2017-3123 | |
CVE-2017-5754 | |
CVE-2017-6753 | |
CVE-2017-7064 | |
CVE-2017-8468 | |
CVE-2017-8496 | |
CVE-2017-8497 | |
CVE-2017-8509 | |
CVE-2017-8524 | |
CVE-2017-8541 | |
CVE-2017-8547 | |
CVE-2017-8558 | |
CVE-2017-8570 | |
CVE-2017-8578 | |
CVE-2017-8594 | |
CVE-2017-8598 | |
CVE-2017-8601 | |
CVE-2017-8605 | |
CVE-2017-8618 | |
CVE-2017-8619 | |
CVE-2017-8625 | |
CVE-2017-8652 | |
CVE-2017-8682 | |
CVE-2017-8694 | |
CVE-2017-8727 | |
CVE-2017-8734 | |
CVE-2017-8747 | |
CVE-2017-8749 | |
CVE-2017-8750 | |
CVE-2017-8751 | |
CVE-2017-8757 | |
CVE-2017-9226 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption. |
CVE-2017-9638 | |
CVE-2017-11210 | |
CVE-2017-11213 | |
CVE-2017-11218 | |
CVE-2017-11220 | |
CVE-2017-11221 | |
CVE-2017-11222 | |
CVE-2017-11223 | |
CVE-2017-11224 | |
CVE-2017-11225 | |
CVE-2017-11226 | |
CVE-2017-11227 | |
CVE-2017-11229 | |
CVE-2017-11232 | |
CVE-2017-11233 | |
CVE-2017-11236 | |
CVE-2017-11237 | |
CVE-2017-11238 | |
CVE-2017-11239 | |
CVE-2017-11242 | |
CVE-2017-11243 | |
CVE-2017-11252 | |
CVE-2017-11258 | |
CVE-2017-11260 | |
CVE-2017-11263 | |
CVE-2017-11265 | |
CVE-2017-11268 | |
CVE-2017-11281 | |
CVE-2017-11282 | |
CVE-2017-11292 | Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value to be used in the calculation of an array index. This can lead to type confusion, and successful exploitation could lead to arbitrary code execution. |
CVE-2017-11791 | |
CVE-2017-11793 | |
CVE-2017-11798 | |
CVE-2017-11802 | |
CVE-2017-11810 | |
CVE-2017-11811 | |
CVE-2017-11812 | |
CVE-2017-11822 | |
CVE-2017-11837 | |
CVE-2017-11840 | |
CVE-2017-11841 | |
CVE-2017-11845 | |
CVE-2017-11846 | |
CVE-2017-11847 | |
CVE-2017-11855 | |
CVE-2017-11856 | Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11855. |
CVE-2017-11858 | |
CVE-2017-11882 | |
CVE-2017-11890 | |
CVE-2017-11893 | |
CVE-2017-11894 | |
CVE-2017-11901 | |
CVE-2017-11903 | |
CVE-2017-11907 | |
CVE-2017-11909 | |
CVE-2017-11913 | |
CVE-2017-11914 | |
CVE-2017-11916 | |
CVE-2017-11930 | |
CVE-2017-11935 | |
CVE-2017-12824 | |
CVE-2017-16368 | |
CVE-2017-16371 | |
CVE-2017-16372 | |
CVE-2017-16382 | |
CVE-2017-16385 | |
CVE-2017-16386 | |
CVE-2017-16388 | |
CVE-2017-16389 | |
CVE-2017-16393 | |
CVE-2017-16394 | |
CVE-2017-16399 | |
CVE-2017-16406 | |
CVE-2017-16410 | |
CVE-2017-16411 | |
CVE-2017-16415 | |
CVE-2017-16416 | |
CVE-2017-16417 | |
CVE-2017-16419 | |
CVE-2017-16943 | |
CVE-2017-17485 | |
CVE-2018-0742 | |
CVE-2018-0758 | |
CVE-2018-0762 | |
CVE-2018-0767 | |
CVE-2018-0774 | |
CVE-2018-0777 | |
CVE-2018-0798 | |
CVE-2018-0802 | |
CVE-2018-0817 | |
CVE-2018-0819 | |
CVE-2018-0825 | StructuredQuery in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how objects are handled in memory, aka "StructuredQuery Remote Code Execution Vulnerability". |
CVE-2018-0834 | |
CVE-2018-0841 | |
CVE-2018-0842 | Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allow an elevation of privilege vulnerability due to how objects in memory are handled, aka "Windows Kernel Elevation of Privilege Vulnerability". |
CVE-2018-0846 | |
CVE-2018-0858 | |
CVE-2018-0860 | |
CVE-2018-0870 | |
CVE-2018-0872 | |
CVE-2018-0874 | |
CVE-2018-0877 | The Desktop Bridge Virtual File System (VFS) in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how file paths are managed, aka "Windows Desktop Bridge VFS Elevation of Privilege Vulnerability". |
CVE-2018-0880 | The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0882. |
CVE-2018-0882 | The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0880. |
CVE-2018-0903 | |
CVE-2018-0920 | |
CVE-2018-0930 | |
CVE-2018-0933 | |
CVE-2018-0935 | |
CVE-2018-0952 | |
CVE-2018-0953 | |
CVE-2018-0955 | |
CVE-2018-0978 | |
CVE-2018-0986 | |
CVE-2018-0988 | |
CVE-2018-0990 | |
CVE-2018-0991 | |
CVE-2018-0995 | |
CVE-2018-0996 | |
CVE-2018-0997 | |
CVE-2018-0998 | |
CVE-2018-1001 | |
CVE-2018-1003 | |
CVE-2018-1010 | |
CVE-2018-1011 | |
CVE-2018-1012 | |
CVE-2018-1013 | |
CVE-2018-1015 | |
CVE-2018-1016 | |
CVE-2018-1018 | |
CVE-2018-1023 | |
CVE-2018-1026 | |
CVE-2018-1027 | |
CVE-2018-1028 | |
CVE-2018-1029 | |
CVE-2018-1030 | |
CVE-2018-4200 | |
CVE-2018-4233 | |
CVE-2018-4871 | |
CVE-2018-4877 | |
CVE-2018-4878 | A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018. |
CVE-2018-4883 | |
CVE-2018-4884 | |
CVE-2018-4886 | |
CVE-2018-4888 | |
CVE-2018-4897 | |
CVE-2018-4898 | |
CVE-2018-4901 | |
CVE-2018-4902 | |
CVE-2018-4903 | |
CVE-2018-4905 | |
CVE-2018-4907 | |
CVE-2018-4911 | |
CVE-2018-4932 | Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. |
CVE-2018-4933 | Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. |
CVE-2018-4934 | Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. |
CVE-2018-4937 | Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. |
CVE-2018-4945 | |
CVE-2018-4952 | |
CVE-2018-4955 | |
CVE-2018-4959 | |
CVE-2018-4961 | |
CVE-2018-4962 | |
CVE-2018-4964 | |
CVE-2018-4965 | |
CVE-2018-4966 | |
CVE-2018-4967 | |
CVE-2018-4968 | |
CVE-2018-4969 | |
CVE-2018-4971 | |
CVE-2018-4972 | |
CVE-2018-4974 | |
CVE-2018-4979 | |
CVE-2018-4982 | |
CVE-2018-4983 | |
CVE-2018-4984 | |
CVE-2018-4985 | |
CVE-2018-4986 | |
CVE-2018-4987 | |
CVE-2018-4990 | |
CVE-2018-4993 | |
CVE-2018-4995 | |
CVE-2018-5001 | |
CVE-2018-5002 | |
CVE-2018-5008 | |
CVE-2018-5009 | |
CVE-2018-5015 | |
CVE-2018-5016 | |
CVE-2018-5017 | |
CVE-2018-5020 | |
CVE-2018-5031 | |
CVE-2018-5032 | |
CVE-2018-5035 | |
CVE-2018-5038 | |
CVE-2018-5060 | |
CVE-2018-5062 | |
CVE-2018-5146 | |
CVE-2018-6064 | |
CVE-2018-8110 | |
CVE-2018-8111 | |
CVE-2018-8120 | |
CVE-2018-8123 | |
CVE-2018-8124 | |
CVE-2018-8125 | |
CVE-2018-8137 | |
CVE-2018-8147 | |
CVE-2018-8148 | |
CVE-2018-8157 | |
CVE-2018-8158 | |
CVE-2018-8161 | |
CVE-2018-8164 | |
CVE-2018-8165 | |
CVE-2018-8166 | |
CVE-2018-8167 | |
CVE-2018-8172 | A remote code execution vulnerability exists in Visual Studio software when the software does not check the source markup of a file for an unbuilt project, aka "Visual Studio Remote Code Execution Vulnerability." This affects Microsoft Visual Studio, Expression Blend 4. |
CVE-2018-8174 | |
CVE-2018-8208 | |
CVE-2018-8233 | |
CVE-2018-8242 | |
CVE-2018-8248 | |
CVE-2018-8249 | |
CVE-2018-8262 | |
CVE-2018-8274 | |
CVE-2018-8275 | |
CVE-2018-8278 | |
CVE-2018-8279 | |
CVE-2018-8283 | |
CVE-2018-8288 | |
CVE-2018-8289 | |
CVE-2018-8291 | |
CVE-2018-8297 | |
CVE-2018-8298 | |
CVE-2018-8324 | |
CVE-2018-8344 | |
CVE-2018-8345 | |
CVE-2018-8353 | |
CVE-2018-8367 | |
CVE-2018-8371 | |
CVE-2018-8373 | |
CVE-2018-8379 | |
CVE-2018-8383 | |
CVE-2018-8384 | |
CVE-2018-8387 | |
CVE-2018-8389 | |
CVE-2018-8391 | |
CVE-2018-8401 | |
CVE-2018-8403 | |
CVE-2018-8404 | |
CVE-2018-8405 | |
CVE-2018-8406 | |
CVE-2018-8411 | |
CVE-2018-8414 | A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10. |
CVE-2018-8420 | |
CVE-2018-8440 | |
CVE-2018-8442 | |
CVE-2018-8447 | |
CVE-2018-8453 | |
CVE-2018-8456 | |
CVE-2018-8461 | |
CVE-2018-8467 | |
CVE-2018-8475 | |
CVE-2018-8495 | |
CVE-2018-8522 | |
CVE-2018-8539 | |
CVE-2018-8544 | |
CVE-2018-8545 | |
CVE-2018-8552 | |
CVE-2018-8553 | |
CVE-2018-8555 | |
CVE-2018-8562 | |
CVE-2018-8563 | |
CVE-2018-8565 | |
CVE-2018-8582 | |
CVE-2018-8584 | |
CVE-2018-8587 | |
CVE-2018-8588 | |
CVE-2018-8589 | |
CVE-2018-8617 | |
CVE-2018-8619 | |
CVE-2018-8624 | |
CVE-2018-8625 | |
CVE-2018-8628 | |
CVE-2018-8653 | |
CVE-2018-8897 | |
CVE-2018-10561 | |
CVE-2018-12386 | |
CVE-2018-12387 | |
CVE-2018-12754 | |
CVE-2018-12763 | |
CVE-2018-12766 | |
CVE-2018-12767 | |
CVE-2018-12768 | |
CVE-2018-12796 | |
CVE-2018-12799 | |
CVE-2018-12825 | |
CVE-2018-12826 | |
CVE-2018-12827 | |
CVE-2018-12830 | |
CVE-2018-12837 | |
CVE-2018-12843 | |
CVE-2018-12844 | |
CVE-2018-12853 | |
CVE-2018-12856 | |
CVE-2018-12857 | |
CVE-2018-12860 | |
CVE-2018-12861 | |
CVE-2018-12862 | |
CVE-2018-12863 | |
CVE-2018-12865 | |
CVE-2018-12866 | |
CVE-2018-12867 | |
CVE-2018-12878 | |
CVE-2018-12880 | |
CVE-2018-12881 | |
CVE-2018-15929 | |
CVE-2018-15942 | |
CVE-2018-15943 | |
CVE-2018-15944 | |
CVE-2018-15945 | |
CVE-2018-15948 | |
CVE-2018-15951 | |
CVE-2018-15982 | |
CVE-2018-15984 | |
CVE-2018-15985 | |
CVE-2018-15989 | |
CVE-2018-15991 | |
CVE-2018-15992 | |
CVE-2018-15995 | |
CVE-2018-15996 | |
CVE-2018-15997 | |
CVE-2018-16001 | |
CVE-2018-16002 | |
CVE-2018-16011 | |
CVE-2018-16012 | |
CVE-2018-16013 | |
CVE-2018-16015 | |
CVE-2018-16017 | |
CVE-2018-16027 | |
CVE-2018-16028 | |
CVE-2018-16029 | |
CVE-2018-16030 | |
CVE-2018-16031 | |
CVE-2018-16033 | |
CVE-2018-16034 | |
CVE-2018-16035 | |
CVE-2018-16040 | |
CVE-2018-16041 | |
CVE-2018-16044 | |
CVE-2018-16047 | |
CVE-2018-16865 | An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable. |
CVE-2018-17463 | |
CVE-2018-19698 | |
CVE-2018-19699 | |
CVE-2018-19700 | |
CVE-2018-19701 | |
CVE-2018-19703 | |
CVE-2018-19704 | |
CVE-2018-19707 | |
CVE-2018-19711 | |
CVE-2018-19712 | |
CVE-2018-19713 | |
CVE-2018-19714 | |
CVE-2018-19715 | |
CVE-2018-19717 | |
CVE-2018-19725 | |
CVE-2018-20250 | |
CVE-2019-0539 | |
CVE-2019-0541 | |
CVE-2019-0543 | |
CVE-2019-0552 | |
CVE-2019-0565 | |
CVE-2019-0566 | |
CVE-2019-0567 | |
CVE-2019-0568 | |
CVE-2019-0569 | |
CVE-2019-0573 | |
CVE-2019-0574 | |
CVE-2019-0591 | |
CVE-2019-0592 | |
CVE-2019-0593 | |
CVE-2019-0606 | |
CVE-2019-0607 | |
CVE-2019-0609 | |
CVE-2019-0610 | |
CVE-2019-0612 | |
CVE-2019-0628 | |
CVE-2019-0633 | |
CVE-2019-0636 | |
CVE-2019-0639 | |
CVE-2019-0640 | |
CVE-2019-0642 | |
CVE-2019-0644 | |
CVE-2019-0645 | |
CVE-2019-0648 | |
CVE-2019-0650 | |
CVE-2019-0651 | |
CVE-2019-0652 | |
CVE-2019-0655 | |
CVE-2019-0656 | |
CVE-2019-0658 | |
CVE-2019-0661 | |
CVE-2019-0665 | |
CVE-2019-0666 | |
CVE-2019-0667 | |
CVE-2019-0669 | |
CVE-2019-0676 | |
CVE-2019-0685 | |
CVE-2019-0731 | |
CVE-2019-0732 | |
CVE-2019-0752 | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0739, CVE-2019-0753, CVE-2019-0862. |
CVE-2019-0753 | |
CVE-2019-0763 | |
CVE-2019-0767 | |
CVE-2019-0768 | |
CVE-2019-0769 | |
CVE-2019-0770 | |
CVE-2019-0775 | |
CVE-2019-0788 | |
CVE-2019-0794 | |
CVE-2019-0796 | |
CVE-2019-0797 | |
CVE-2019-0801 | |
CVE-2019-0803 | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859. |
CVE-2019-0805 | |
CVE-2019-0806 | |
CVE-2019-0808 | |
CVE-2019-0810 | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0806, CVE-2019-0812, CVE-2019-0829, CVE-2019-0860, CVE-2019-0861. |
CVE-2019-0812 | |
CVE-2019-0822 | |
CVE-2019-0829 | |
CVE-2019-0836 | |
CVE-2019-0840 | |
CVE-2019-0841 | An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836. |
CVE-2019-0844 | |
CVE-2019-0859 | |
CVE-2019-0861 | |
CVE-2019-0862 | |
CVE-2019-0863 | An elevation of privilege vulnerability exists in the way Windows Error Reporting (WER) handles files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'. |
CVE-2019-0880 | |
CVE-2019-0884 | |
CVE-2019-0885 | |
CVE-2019-0911 | |
CVE-2019-0918 | |
CVE-2019-0920 | |
CVE-2019-0930 | |
CVE-2019-0931 | |
CVE-2019-0938 | |
CVE-2019-0940 | |
CVE-2019-0943 | |
CVE-2019-0959 | |
CVE-2019-0986 | |
CVE-2019-0988 | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0920, CVE-2019-1005, CVE-2019-1055, CVE-2019-1080. |
CVE-2019-0989 | |
CVE-2019-0990 | |
CVE-2019-0991 | |
CVE-2019-0992 | |
CVE-2019-0993 | |
CVE-2019-1001 | |
CVE-2019-1003 | |
CVE-2019-1004 | |
CVE-2019-1005 | |
CVE-2019-1014 | |
CVE-2019-1017 | |
CVE-2019-1023 | |
CVE-2019-1030 | |
CVE-2019-1041 | |
CVE-2019-1051 | |
CVE-2019-1055 | |
CVE-2019-1060 | |
CVE-2019-1063 | |
CVE-2019-1065 | An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1041. |
CVE-2019-1073 | |
CVE-2019-1074 | |
CVE-2019-1089 | |
CVE-2019-1092 | |
CVE-2019-1104 | |
CVE-2019-1107 | |
CVE-2019-1112 | |
CVE-2019-1132 | |
CVE-2019-1140 | |
CVE-2019-1164 | |
CVE-2019-1170 | An elevation of privilege vulnerability exists when reparse points are created by sandboxed processes allowing sandbox escape, aka 'Windows NTFS Elevation of Privilege Vulnerability'. |
CVE-2019-1195 | |
CVE-2019-1196 | |
CVE-2019-1214 | |
CVE-2019-1215 | |
CVE-2019-1216 | |
CVE-2019-1219 | |
CVE-2019-1238 | |
CVE-2019-1239 | |
CVE-2019-1256 | |
CVE-2019-1257 | |
CVE-2019-1284 | |
CVE-2019-1285 | |
CVE-2019-1296 | |
CVE-2019-1307 | |
CVE-2019-1308 | |
CVE-2019-1335 | |
CVE-2019-1344 | |
CVE-2019-1345 | |
CVE-2019-1362 | |
CVE-2019-1366 | |
CVE-2019-1367 | |
CVE-2019-1390 | |
CVE-2019-1393 | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1394, CVE-2019-1395, CVE-2019-1396, CVE-2019-1408, CVE-2019-1434. |
CVE-2019-1394 | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1393, CVE-2019-1395, CVE-2019-1396, CVE-2019-1408, CVE-2019-1434. |
CVE-2019-1396 | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1393, CVE-2019-1394, CVE-2019-1395, CVE-2019-1408, CVE-2019-1434. |
CVE-2019-1429 | |
CVE-2019-1436 | |
CVE-2019-1437 | |
CVE-2019-1485 | |
CVE-2019-5786 | |
CVE-2019-6116 | In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution. |
CVE-2019-7018 | |
CVE-2019-7019 | |
CVE-2019-7020 | |
CVE-2019-7021 | |
CVE-2019-7022 | |
CVE-2019-7024 | |
CVE-2019-7025 | |
CVE-2019-7026 | |
CVE-2019-7029 | |
CVE-2019-7030 | |
CVE-2019-7032 | |
CVE-2019-7033 | |
CVE-2019-7036 | |
CVE-2019-7038 | |
CVE-2019-7039 | |
CVE-2019-7040 | |
CVE-2019-7041 | |
CVE-2019-7043 | |
CVE-2019-7044 | |
CVE-2019-7045 | |
CVE-2019-7046 | |
CVE-2019-7048 | |
CVE-2019-7049 | |
CVE-2019-7050 | |
CVE-2019-7051 | |
CVE-2019-7052 | |
CVE-2019-7053 | |
CVE-2019-7054 | |
CVE-2019-7055 | |
CVE-2019-7056 | |
CVE-2019-7058 | |
CVE-2019-7059 | |
CVE-2019-7060 | |
CVE-2019-7061 | Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . |
CVE-2019-7063 | |
CVE-2019-7064 | |
CVE-2019-7065 | |
CVE-2019-7066 | |
CVE-2019-7067 | |
CVE-2019-7068 | |
CVE-2019-7069 | |
CVE-2019-7070 | |
CVE-2019-7071 | |
CVE-2019-7072 | |
CVE-2019-7074 | |
CVE-2019-7076 | |
CVE-2019-7077 | |
CVE-2019-7079 | |
CVE-2019-7080 | |
CVE-2019-7082 | |
CVE-2019-7084 | |
CVE-2019-7108 | Adobe Flash Player versions 32.0.0.156 and earlier, 32.0.0.156 and earlier, and 32.0.0.156 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . |
CVE-2019-7112 | |
CVE-2019-7118 | |
CVE-2019-7120 | |
CVE-2019-7122 | |
CVE-2019-7124 | |
CVE-2019-7127 | |
CVE-2019-7143 | |
CVE-2019-7782 | |
CVE-2019-7837 | |
CVE-2019-8518 | |
CVE-2019-10149 | A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. |
CVE-2019-11687 | |
CVE-2019-11707 | A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2. |
CVE-2019-11932 | A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image. |
CVE-2019-13686 | |
CVE-2019-13720 | Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
CVE-2019-16858 | |
CVE-2020-0601 | A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'. |
CVE-2020-0634 | |
CVE-2020-0674 | |
CVE-2020-0720 | |
CVE-2020-0721 | |
CVE-2020-0723 | |
CVE-2020-0726 | |
CVE-2020-0784 | |
CVE-2020-0788 | |
CVE-2020-0824 | |
CVE-2020-0832 | |
CVE-2020-0833 | |
CVE-2020-0847 | |
CVE-2020-0898 | |
CVE-2020-0938 | |
CVE-2020-0968 | |
CVE-2020-0986 | An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316. |
CVE-2020-1020 | A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0938. |
CVE-2020-1035 | |
CVE-2020-1048 | An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070. |
CVE-2020-1058 | |
CVE-2020-1060 | |
CVE-2020-1062 | |
CVE-2020-1153 | |
CVE-2020-1207 | |
CVE-2020-1213 | |
CVE-2020-1214 | |
CVE-2020-1215 | |
CVE-2020-1216 | |
CVE-2020-1219 | |
CVE-2020-1230 | |
CVE-2020-3805 |