Vulnerabilities > Critical

DATE CVE VULNERABILITY TITLE RISK
2015-05-20 CVE-2015-1920 Improper Access Control vulnerability in IBM Websphere Application Server
IBM WebSphere Application Server (WAS) 6.1 through 6.1.0.47, 7.0 before 7.0.0.39, 8.0 before 8.0.0.11, and 8.5 before 8.5.5.6 allows remote attackers to execute arbitrary code by sending crafted instructions in a management-port session.
network
low complexity
ibm CWE-284
critical
10.0
2015-05-19 CVE-2015-3408 Command Injection vulnerability in multiple products
Module::Signature before 0.74 allows remote attackers to execute arbitrary shell commands via a crafted SIGNATURE file which is not properly handled when generating checksums from a signed manifest.
network
low complexity
module-signature-project canonical CWE-77
critical
10.0
2015-05-19 CVE-2015-1845 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Unzoo
Buffer overflow in the EntrReadArch function in unzoo might allow remote attackers to execute arbitrary code via unspecified vectors.
network
low complexity
unzoo CWE-119
critical
10.0
2015-05-18 CVE-2015-3306 Improper Access Control vulnerability in Proftpd 1.3.5
The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
network
low complexity
proftpd CWE-284
critical
10.0
2015-05-18 CVE-2014-8384 Authentication Bypass vulnerability in Infocus In3128Hd Firmware 0.26
The InFocus IN3128HD projector with firmware 0.26 does not restrict access to cgi-bin/webctrl.cgi.elf, which allows remote attackers to modify the DHCP server and device IP configuration, reboot the device, change the device name, and have other unspecified impact via a crafted request.
network
low complexity
infocus
critical
9.4
2015-05-18 CVE-2014-8383 Authentication Bypass vulnerability in Infocus In3128Hd Firmware 0.26
The InFocus IN3128HD projector with firmware 0.26 allows remote attackers to bypass authentication via a direct request to main.html.
network
low complexity
infocus
critical
10.0
2015-05-13 CVE-2015-3093 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe products
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3090.
network
low complexity
adobe linux apple microsoft CWE-119
critical
10.0
2015-05-13 CVE-2015-3090 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe products
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3093.
network
low complexity
adobe apple microsoft linux CWE-119
critical
10.0
2015-05-13 CVE-2015-3089 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe products
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3090, and CVE-2015-3093.
network
low complexity
adobe apple microsoft linux CWE-119
critical
10.0
2015-05-13 CVE-2015-3088 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe products
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
network
low complexity
adobe linux apple microsoft CWE-119
critical
10.0