NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 28680 | CVE-2015-8561 | The F1BookView ActiveX control in F1 Bookview in Schneider Electric ProClima before 6.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted integer value to the (1) AttachToSS, (2) CopyAll, (3) CopyRange, (4) CopyRangeEx, or (5) SwapTable method, a different vulnerability than CVE-2015-7918. | 2 | 6.8 | Medium | 2017-01-19 | 2015-12-16 | View | |
| 28936 | CVE-2015-8945 | openshift-node in OpenShift Origin 1.1.6 and earlier improperly stores router credentials as envvars in the pod when the --credentials option is used, which allows local users to obtain sensitive private key information by reading the systemd journal. | 2 | 1.9 | Low | 2017-01-19 | 2016-08-05 | View | |
| 29448 | CVE-2014-0556 | Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK & Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0559. | 2 | 10 | High | 2017-01-19 | 2017-01-06 | View | |
| 29704 | CVE-2014-0860 | The firmware before 3.66E in IBM BladeCenter Advanced Management Module (AMM), the firmware before 1.43 in IBM Integrated Management Module (IMM), and the firmware before 4.15 in IBM Integrated Management Module II (IMM2) contains cleartext IPMI credentials, which allows attackers to execute arbitrary IPMI commands, and consequently establish a blade remote-control session, by leveraging access to (1) the chassis internal network or (2) the Ethernet-over-USB interface. | 2 | 5 | Medium | 2017-01-19 | 2014-07-07 | View | |
| 29960 | CVE-2014-1279 | Apple TV before 6.1 does not properly restrict logging, which allows local users to obtain sensitive information by reading log data. | 2 | 2.1 | Low | 2017-01-19 | 2014-03-14 | View |
Page 2715 of 17672, showing 5 records out of 88360 total, starting on record 13571, ending on 13575