category

AI Vulnerabilities

Software vulnerabilities connected to AI systems, incidents, or known exploitation.

Showing 1141-1160 of 1600 records

CVE-2015-0313 - Adobe Flash Player

CVE-2015-0313 is a vulnerability profile for Adobe Flash Player listed by CISA as known exploited.

CVE-2015-0311 - Adobe Flash Player

CVE-2015-0311 is a vulnerability profile for Adobe Flash Player listed by CISA as known exploited.

CVE-2015-0310 - Adobe Flash Player

CVE-2015-0310 is a vulnerability profile for Adobe Flash Player listed by CISA as known exploited.

CVE-2015-0071 - Microsoft Internet Explorer

CVE-2015-0071 is a vulnerability profile for Microsoft Internet Explorer listed by CISA as known exploited.

CVE-2015-0016 - Microsoft Windows

CVE-2015-0016 is a vulnerability profile for Microsoft Windows listed by CISA as known exploited.

CVE-2014-9163 - Adobe Flash Player

CVE-2014-9163 is a vulnerability profile for Adobe Flash Player listed by CISA as known exploited.

CVE-2014-8439 - Adobe Flash Player

CVE-2014-8439 is a vulnerability profile for Adobe Flash Player listed by CISA as known exploited.

CVE-2014-8361 - Realtek SDK

CVE-2014-8361 is a vulnerability profile for Realtek SDK listed by CISA as known exploited.

CVE-2014-7169 - GNU Bourne-Again Shell (Bash)

CVE-2014-7169 is a vulnerability profile for GNU Bourne-Again Shell (Bash) listed by CISA as known exploited.

CVE-2014-6352 - Microsoft Windows

CVE-2014-6352 is a vulnerability profile for Microsoft Windows listed by CISA as known exploited.

CVE-2014-6332 - Microsoft Windows

CVE-2014-6332 is a vulnerability profile for Microsoft Windows listed by CISA as known exploited.

CVE-2014-6324 - Microsoft Kerberos Key Distribution Center (KDC)

CVE-2014-6324 is a vulnerability profile for Microsoft Kerberos Key Distribution Center (KDC) listed by CISA as known exploited.

CVE-2014-6287 - Rejetto HTTP File Server (HFS)

CVE-2014-6287 is a vulnerability profile for Rejetto HTTP File Server (HFS) listed by CISA as known exploited.

CVE-2014-6278 - GNU GNU Bash

CVE-2014-6278 is a vulnerability profile for GNU GNU Bash listed by CISA as known exploited.

CVE-2014-6271 - GNU Bourne-Again Shell (Bash)

CVE-2014-6271 is a vulnerability profile for GNU Bourne-Again Shell (Bash) listed by CISA as known exploited.

CVE-2014-4404 - Apple OS X

CVE-2014-4404 is a vulnerability profile for Apple OS X listed by CISA as known exploited.

CVE-2014-4148 - Microsoft Windows

CVE-2014-4148 is a vulnerability profile for Microsoft Windows listed by CISA as known exploited.

CVE-2014-4123 - Microsoft Internet Explorer

CVE-2014-4123 is a vulnerability profile for Microsoft Internet Explorer listed by CISA as known exploited.

CVE-2014-4114 - Microsoft Windows

CVE-2014-4114 is a vulnerability profile for Microsoft Windows listed by CISA as known exploited.

CVE-2014-4113 - Microsoft Win32k

CVE-2014-4113 is a vulnerability profile for Microsoft Win32k listed by CISA as known exploited.