44 CISA Known Exploited Vulnerabilities from 2015
Juniper ScreenOS — Juniper ScreenOS Improper Authentication Vulnerability
CVSS 9.8Adobe Flash Player — Adobe Flash Player Remote Code Execution Vulnerability
CVSS 9.8Adobe Flash Player — Adobe Flash Player Use-After-Free Vulnerability
CVSS 9.8Adobe Flash Player — Adobe Flash Player Heap-Based Buffer Overflow Vulnerability
CVSS 9.8Adobe Flash Player — Adobe Flash Player Use-After-Free Vulnerability
CVSS 9.8Adobe Flash Player — Adobe Flash Player Use-After-Free Vulnerability
CVSS 9.8D-Link and TRENDnet Multiple Devices — D-Link and TRENDnet Multiple Devices Remote Code Execution Vulnerability
CVSS 9.8Elastic Elasticsearch — Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability
CVSS 9.8Oracle Java SE — Oracle Java SE and Java SE Embedded Remote Code Execution Vulnerability
CVSS 9.8Adobe Flash Player — Adobe Flash Player Memory Corruption Vulnerability
CVSS 9.8Adobe Flash Player — Adobe Flash Player Use-After-Free Vulnerability
CVSS 9.8Microsoft HTTP.sys — Microsoft HTTP.sys Remote Code Execution Vulnerability
CVSS 9.8D-Link DIR-645 Router — D-Link DIR-645 Router Remote Code Execution Vulnerability
CVSS 9.8IBM WebSphere Application Server and Server Hypervisor Edition — IBM WebSphere Application Server and Server Hypervisor Edition Code Injection.
CVSS 9.8Oracle WebLogic Server — Oracle WebLogic Server Deserialization of Untrusted Data Vulnerability
CVSS 9.8Arcserve Unified Data Protection (UDP) — Arcserve Unified Data Protection (UDP) Directory Traversal Vulnerability
CVSS 9.1Microsoft Win32k — Microsoft Win32k Privilege Escalation Vulnerability
CVSS 8.8Microsoft Internet Explorer — Microsoft Internet Explorer Memory Corruption Vulnerability
CVSS 8.8Mozilla Firefox — Mozilla Firefox Security Feature Bypass Vulnerability
CVSS 8.8Adobe Flash Player — Adobe Flash Player Integer Overflow Vulnerability
CVSS 8.8Microsoft Internet Explorer — Microsoft Internet Explorer Memory Corruption Vulnerability
CVSS 8.8Microsoft Office — Microsoft Office Uninitialized Memory Use Vulnerability
CVSS 8.8Microsoft Internet Explorer — Microsoft Internet Explorer Memory Corruption Vulnerability
CVSS 8.8Microsoft Windows — Microsoft Windows Adobe Type Manager Library Remote Code Execution Vulnerability
CVSS 8.8Microsoft PowerPoint — Microsoft PowerPoint Memory Corruption Vulnerability
CVSS 8.8Microsoft Win32k — Microsoft Win32k Memory Corruption Vulnerability
CVSS 8.2Intel Ethernet Diagnostics Driver for Windows — Intel Ethernet Diagnostics Driver for Windows Denial-of-Service Vulnerability
CVSS 7.8Microsoft Windows — Microsoft Windows TS WebProxy Directory Traversal Vulnerability
CVSS 7.8Adobe Flash Player — Adobe Flash Player ASLR Bypass Vulnerability
CVSS 7.8Microsoft Windows — Microsoft Windows Remote Code Execution Vulnerability
CVSS 7.8Microsoft Windows — Microsoft Windows Kernel Privilege Escalation Vulnerability
CVSS 7.8Microsoft Office — Microsoft Office Memory Corruption Vulnerability
CVSS 7.8Microsoft Win32k — Microsoft Win32k Privilege Escalation Vulnerability
CVSS 7.8Microsoft ATM Font Driver — Microsoft ATM Font Driver Privilege Escalation Vulnerability
CVSS 7.8Microsoft Office — Microsoft Office Malformed EPS File Vulnerability
CVSS 7.8Adobe Flash Player — Adobe Flash Player Arbitrary Code Execution Vulnerability
CVSS 7.8Apple OS X — Apple OS X Authentication Bypass Vulnerability
CVSS 7.8Microsoft Office — Microsoft Office Memory Corruption Vulnerability
CVSS 7.8Jenkins Jenkins User Interface (UI) — Jenkins User Interface (UI) Information Disclosure Vulnerability
CVSS 7.5Cisco Prime Data Center Network Manager (DCNM) — Cisco Prime Data Center Network Manager (DCNM) Directory Traversal Vulnerability
CVSS 7.5TP-Link Multiple Archer Devices — TP-Link Multiple Archer Devices Directory Traversal Vulnerability
CVSS 7.5Microsoft Windows — Microsoft Windows Mount Manager Privilege Escalation Vulnerability
CVSS 6.6Microsoft Internet Explorer — Microsoft Internet Explorer ASLR Bypass Vulnerability
CVSS 6.5Oracle Java SE — Oracle Java SE Integrity Check Vulnerability
CVSS 5.3