NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
28685 | CVE-2015-8566 | The Session package 1.x before 1.3.1 for Joomla! Framework allows remote attackers to execute arbitrary code via unspecified session values. | 2 | 7.5 | High | 2017-01-19 | 2015-12-17 | View | |
28941 | CVE-2015-8950 | arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call. | 2 | 4.3 | Medium | 2017-01-19 | 2016-11-28 | View | |
29197 | CVE-2014-0297 | Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0308, CVE-2014-0312, and CVE-2014-0324. | 2 | 9.3 | High | 2017-01-19 | 2014-03-12 | View | |
29453 | CVE-2014-0561 | Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0567. | 2 | 10 | High | 2017-01-19 | 2017-01-06 | View | |
29709 | CVE-2014-0865 | RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 through 4.7.0 before 4.7.0.03 FP5 in IBM Algorithmics relies on client-side input validation, which allows remote authenticated users to bypass intended dual-control restrictions and modify data via crafted serialized objects, as demonstrated by limit manipulations. | 2 | 4.9 | Medium | 2017-01-19 | 2017-01-06 | View |
Page 810 of 17672, showing 5 records out of 88360 total, starting on record 4046, ending on 4050