Vulnerability Summary for the Week of August 24, 2015
Vulnerability Summary for the Week of August 24, 2015 Please Note: • The vulnerabilities are cattegorized by their level of severity which is either High, Medium or Low. • The !" indentity number is the #ublicly $nown %& given to that #articular vulnerability. Therefore you can search the status of that #articular vulnerability using that %&. • The !'S (Common !ulnerability 'coring System) score is a standard scoring system used to determine the severity of the vulnerability. High Severity Vulnerabilities The Primary Vendor --- Description Date CVSS The CVE Product Published Score Identity actiontec ** .ctiontec /T0123N modems with firmware 2015-08-23 8.3 CVE-2015-2904 CERT-VN +ncs,-+firmware before NC',-*-.0.14 have hardcoded credentials, which ma$es it easier for remote attac$ers to obtain root access by connecting to the web administration interface. adobe ** air 5se*after*free vulnerability in .dobe 6lash Player 2015-08-24 10.0 CVE-2015-5566 CONFIRM (link before -1.0.0.747 on 3indows and 8' 9 and is external) before --.2.2,7.5,1 on Linu;, .dobe .%< before -1.0.,.1==, .dobe .%< '&> before -1.0.0.-==, and .dobe .%< '&> ? om#iler before -1.0.0.1== allows attac$ers to e;ecute arbitrary code via uns#ecified vectors, a different vulnerability than !"*7,-:*:-70, !"*7,-:*:-4,, !"*7,-:* :-42, !"*7,-:*::4=, !"*7,-:*::2,, !"* 7,-:*:::,, !"*7,-:*:::-, !"*7,-:*:::@, !"*7,-:*:::0, !"*7,-:*:::=, !"*7,-:*::@-, !"*7,-:*::@4, !"*7,-:*::@2, and !"*7,-:* ::@:. a#ache ** ta#estry .#ache Ta#estry before :.3.6 relies on client*side 2015-08-22 7.8 CVE-2014-1972 CONFIRM obAect storage without chec$ing whether a client has modified an obAect, which allows remote CONFIRM JVNDB (link is attac$ers to cause a denial of service (resource external) consum#tion) or e;ecute arbitrary code via JVN (link is crafted serialized data.
[Show full text]