Vulnerabilities > Microsoft > Windows

DATE CVE VULNERABILITY TITLE RISK
2015-03-13 CVE-2015-0334 Type Confusion Remote Code Execution vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0336.
network
adobe apple microsoft linux
critical
9.3
2015-03-13 CVE-2015-0333 Resource Management Errors vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0335, and CVE-2015-0339.
network
low complexity
adobe apple microsoft linux CWE-399
critical
10.0
2015-03-13 CVE-2015-0332 Memory Corruption vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0333, CVE-2015-0335, and CVE-2015-0339.
network
low complexity
adobe apple microsoft linux
critical
10.0
2015-03-09 CVE-2014-7898 Unspecified vulnerability in HP OLE Point of Sale Driver 1.13.001
The OLE Point of Sale (OPOS) drivers before 1.13.003 on HP Point of Sale Windows PCs allow remote attackers to execute arbitrary code via unspecified vectors.
network
low complexity
hp microsoft
critical
10.0
2015-02-28 CVE-2015-0884 Unspecified vulnerability in Toshiba Bluetooth Stack and Service Station
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
6.9
2015-02-25 CVE-2015-0833 DLL Loading Arbitrary Code Execution vulnerability in Mozilla Firefox Firefox ESR and Thunderbird
Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 on Windows, when the Maintenance Service is not used, allow local users to gain privileges via a Trojan horse DLL in (1) the current working directory or (2) a temporary directory, as demonstrated by bcrypt.dll.
6.9
2015-02-21 CVE-2015-0331 Use After Free Remote Code Execution vulnerability in Adobe Flash Player
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322.
network
low complexity
adobe apple microsoft linux
critical
10.0
2015-02-13 CVE-2014-6154 Path Traversal vulnerability in IBM Optim Performance Manager 4.1.1/4.1.1.1/5.1.0
Directory traversal vulnerability in IBM Optim Performance Manager for DB2 4.1.0.1 through 4.1.1 on Linux, UNIX, and Windows and IBM InfoSphere Optim Performance Manager for DB2 5.1 through 5.3.1 on Linux, UNIX, and Windows allows remote attackers to access arbitrary files via a ..
network
low complexity
ibm linux microsoft CWE-22
7.8
2015-02-09 CVE-2015-1565 Cross-site Scripting vulnerability in Hitachi products
Cross-site scripting (XSS) vulnerability in the online help in Hitachi Device Manager, Tiered Storage Manager, Replication Manager, and Global Link Manager before 8.1.2-00, and Compute Systems Manager before 7.6.1-08 and 8.x before 8.1.2-00, as used in Hitachi Command Suite, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
4.3
2015-02-06 CVE-2015-0330 Security vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, and CVE-2015-0329.
network
low complexity
adobe apple microsoft linux
critical
10.0