Vulnerabilities > Code

DATE CVE VULNERABILITY TITLE RISK
2015-08-12 CVE-2015-1334 Code vulnerability in Linuxcontainers LXC
attach.c in LXC 1.1.2 and earlier uses the proc filesystem in a container, which allows local container users to escape AppArmor or SELinux confinement by mounting a proc filesystem with a crafted (1) AppArmor profile or (2) SELinux label.
local
low complexity
linuxcontainers CWE-17
4.6
2015-08-11 CVE-2015-5176 Code vulnerability in Redhat Jboss Portal 6.2.0
The PortletRequestDispatcher in PortletBridge, as used in Red Hat JBoss Portal 6.2.0, does not properly enforce the security constraints of servlets, which allows remote attackers to gain access to resources via a request that asks to render a non-JSF resource.
network
redhat CWE-17
5.8
2015-08-08 CVE-2015-1805 Code vulnerability in multiple products
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."
local
low complexity
google linux CWE-17
7.2
2015-07-20 CVE-2015-1935 Code vulnerability in IBM DB2
The scalar-function implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.
network
low complexity
ibm CWE-17
8.0
2015-07-16 CVE-2015-4637 Code vulnerability in F5 products
The REST API in F5 BIG-IQ Cloud, Device, and Security 4.4.0 and 4.5.0 before HF2 and ADC 4.5.0 before HF2, when configured for LDAP remote authentication and the LDAP server allows anonymous BIND operations, allows remote attackers to obtain an authentication token for arbitrary users by guessing an LDAP user account name.
network
f5 CWE-17
4.3
2015-07-08 CVE-2015-4620 Code vulnerability in ISC Bind
name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
network
low complexity
isc CWE-17
7.8
2015-06-28 CVE-2015-2019 Code vulnerability in IBM Tivoli Directory Server
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 does not prevent caching of documents retrieved in SSL sessions, which allows physically proximate attackers to obtain sensitive information by leveraging an unattended workstation.
local
low complexity
ibm CWE-17
2.1
2015-06-28 CVE-2015-0173 Code vulnerability in IBM Websphere MQ Internet Pass Thru 2.1.0.1
The HTTP connection-management functionality in Internet Pass-Thru (IPT) before 2.1.0.2 in IBM WebSphere MQ, when HTTPS is disabled, does not properly generate MQIPT Session IDs, which makes it easier for remote attackers to bypass intended restrictions on MQ message data by predicting an ID value.
network
ibm CWE-17
4.3
2015-06-10 CVE-2015-1728 Code vulnerability in Microsoft Windows Media Player
Microsoft Windows Media Player 10 through 12 allows remote attackers to execute arbitrary code via a crafted DataObject on a web site, aka "Windows Media Player RCE via DataObject Vulnerability."
network
microsoft CWE-17
critical
9.3
2015-06-01 CVE-2015-3177 Code vulnerability in Moodle
Moodle 2.8.x before 2.8.6 does not consider the tool/monitor:subscribe capability before entering subscriptions to site-wide event-monitor rules, which allows remote authenticated users to obtain sensitive information via a subscription request.
network
moodle CWE-17
3.5