cve_id stringlengths 13 16 ⌀ | description stringlengths 34 2.67k ⌀ | published_date stringdate 1999-03-01 00:00:00 2018-08-06 00:00:00 ⌀ | last_modified stringdate 2024-11-21 00:00:00 2026-05-06 00:00:00 ⌀ | cwe_ids stringclasses 347
values | affected_products stringlengths 7 639 ⌀ | reference_urls stringlengths 49 643 ⌀ | exploit_available stringclasses 2
values | cvss_score stringclasses 35
values | cvss_severity stringclasses 4
values | attack_vector stringclasses 3
values | attack_complexity stringclasses 2
values | privileges_required stringclasses 3
values | user_interaction stringclasses 2
values | scope stringclasses 2
values | confidentiality_impact stringclasses 3
values | integrity_impact stringclasses 3
values | availability_impact stringclasses 3
values | exploitability_score stringclasses 12
values | impact_score stringclasses 15
values | attack_type stringclasses 33
values | likely_mitre_tactic stringclasses 7
values | risk_score stringclasses 58
values | risk_level stringclasses 4
values | primary_vendor_product stringlengths 5 107 ⌀ | in_cisa_kev stringclasses 2
values | ransomware_use stringclasses 2
values | kev_required_action stringclasses 7
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2015-2874 | Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware before 3.4.1.105 have a default password of root for the root account, which allows remote attackers to obtain administrative access via a TELNET session. | 2015-12-31 | 2026-05-06 | CWE-255 | seagate/wireless_mobile_storage:*|seagate/wireless_plus_mobile_storage:*|lacie/lac9000436u_firmware:*|lacie/lac9000464u_firmware:*|seagate/goflex_sattelite:* | https://www.kb.cert.org/vuls/id/903500|https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH|https://www.kb.cert.org/vuls/id/GWAN-A26L3F|https://www.kb.cert.org/vuls/id/903500|https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | seagate/wireless_mobile_storage | False | Unknown | nan |
CVE-2015-5995 | Mediabridge Medialink MWN-WAPR300N devices with firmware 5.07.50 and Tenda N3 Wireless N150 devices allow remote attackers to obtain administrative access via a certain admin substring in an HTTP Cookie header. | 2015-12-31 | 2026-05-06 | CWE-264 | tenda/n3_wireless_n150:*|mediabridge/medialink_mwn-wapr300n_firmware:* | https://www.kb.cert.org/vuls/id/630872|https://www.kb.cert.org/vuls/id/630872 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | tenda/n3_wireless_n150 | False | Unknown | nan |
CVE-2015-6016 | ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors. | 2015-12-31 | 2026-05-06 | CWE-255 | zyxel/nbg-418n:-|zyxel/zynos_firmware:3.40\(axh.0\)|zyxel/pmg5318-b20a_firmware:v100aanc0b5 | http://www.securitytracker.com/id/1034552|http://www.securitytracker.com/id/1034553|http://www.securitytracker.com/id/1034554|https://www.kb.cert.org/vuls/id/870744|https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | zyxel/nbg-418n | False | Unknown | nan |
CVE-2015-6018 | The diagnostic-ping implementation on ZyXEL PMG5318-B20A devices with firmware before 1.00(AANC.2)C0 allows remote attackers to execute arbitrary commands via the PingIPAddr parameter. | 2015-12-31 | 2026-05-06 | CWE-264 | zyxel/pmg5318-b20a_firmware:* | http://www.securitytracker.com/id/1034553|https://www.exploit-db.com/exploits/38455/|https://www.kb.cert.org/vuls/id/870744|https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R|http://www.securitytracker.com/id/1034553 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | zyxel/pmg5318-b20a_firmware | False | Unknown | nan |
CVE-2015-7277 | The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. | 2015-12-31 | 2026-05-06 | CWE-255 | ampedwireless/r10000_firmware:2.5.2.11 | http://www.securityfocus.com/bid/78818|https://www.kb.cert.org/vuls/id/763576|http://www.securityfocus.com/bid/78818|https://www.kb.cert.org/vuls/id/763576 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | ampedwireless/r10000_firmware | False | Unknown | nan |
CVE-2015-7280 | The web administration interface on ReadyNet WRT300N-DD devices with firmware 1.0.26 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. | 2015-12-31 | 2026-05-06 | CWE-255 | readynet_solutions/wrt300n-dd_firmware:1.0.26 | http://www.securityfocus.com/bid/78814|https://www.kb.cert.org/vuls/id/167992|http://www.securityfocus.com/bid/78814|https://www.kb.cert.org/vuls/id/167992 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | readynet_solutions/wrt300n-dd_firmware | False | Unknown | nan |
CVE-2015-5988 | The web management interface on Belkin F9K1102 2 devices with firmware 2.10.17 has a blank password, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. | 2015-12-31 | 2026-05-06 | CWE-255 | zyxel/gs1900-10hp_firmware:* | https://www.kb.cert.org/vuls/id/201168|https://www.kb.cert.org/vuls/id/201168 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | zyxel/gs1900-10hp_firmware | False | Unknown | nan |
CVE-2015-5989 | Belkin F9K1102 2 devices with firmware 2.10.17 rely on client-side JavaScript code for authorization, which allows remote attackers to obtain administrative privileges via certain changes to LockStatus and Login_Success values. | 2015-12-31 | 2026-05-06 | CWE-264 | zyxel/gs1900-10hp_firmware:* | https://www.kb.cert.org/vuls/id/201168|https://www.kb.cert.org/vuls/id/201168 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | zyxel/gs1900-10hp_firmware | False | Unknown | nan |
CVE-2015-7426 | The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.3.0 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 before 4.1.3.0 allows remote attackers... | 2016-01-02 | 2026-05-06 | CWE-78 | ibm/spectrum_protect_for_virtual_environments:7.1|ibm/spectrum_protect_snapshot:4.1 | http://www-01.ibm.com/support/docview.wss?uid=swg21971484|http://www-01.ibm.com/support/docview.wss?uid=swg21971484 | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | OS Command Injection | Execution | 84.5 | HIGH | ibm/spectrum_protect_for_virtual_environments | False | Unknown | nan |
CVE-2015-7450 | Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library. | 2016-01-02 | 2026-04-21 | CWE-502|CWE-502 | ibm/sterling_b2b_integrator:5.2|ibm/sterling_integrator:5.1|ibm/tivoli_common_reporting:2.1|ibm/tivoli_common_reporting:2.1.1|ibm/tivoli_common_reporting:2.1.1.2|ibm/tivoli_common_reporting:3.1|ibm/tivoli_common_reporting:3.1.0.1|ibm/tivoli_common_reporting:3.1.0.2|ibm/tivoli_common_reporting:3.1.2|ibm/tivoli_common_re... | http://www-01.ibm.com/support/docview.wss?uid=swg21970575|http://www-01.ibm.com/support/docview.wss?uid=swg21971342|http://www-01.ibm.com/support/docview.wss?uid=swg21971376|http://www-01.ibm.com/support/docview.wss?uid=swg21971733|http://www-01.ibm.com/support/docview.wss?uid=swg21971758 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Deserialization Vulnerability | Execution | 100.0 | CRITICAL | ibm/sterling_b2b_integrator | True | Unknown | Apply updates per vendor instructions. |
CVE-2016-1283 | The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-b... | 2016-01-03 | 2026-05-06 | CWE-119 | pcre/pcre:8.38|php/php:*|php/php:*|php/php:*|fedoraproject/fedora:22|fedoraproject/fedora:23|oracle/solaris:11.3 | http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html|http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html|http://www.securityfocus.com/bid/79825|http://www.securitytracker.com/id/103455... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | pcre/pcre | False | Unknown | nan |
CVE-2015-6636 | mediaserver in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 25070493 and 24686670. | 2016-01-06 | 2026-05-06 | CWE-119 | google/android:5.0|google/android:5.1.1|google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-01-01.html|http://www.securitytracker.com/id/1034592|http://source.android.com/security/bulletin/2016-01-01.html|http://www.securitytracker.com/id/1034592 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2015-6642 | The kernel in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24157888. | 2016-01-06 | 2026-05-06 | CWE-264 | google/android:5.1.0|google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-01-01.html|http://www.securitytracker.com/id/1034592|http://source.android.com/security/bulletin/2016-01-01.html|http://www.securitytracker.com/id/1034592 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2015-8261 | The DroneDeleteOldMeasurements implementation in Ipswitch WhatsUp Gold before 16.4 does not properly validate serialized XML objects, which allows remote attackers to conduct SQL injection attacks via a crafted SOAP request. | 2016-01-08 | 2026-05-06 | CWE-89 | progress/whatsup_gold:16.3 | http://www.securitytracker.com/id/1034613|https://www.exploit-db.com/exploits/39231/|https://www.kb.cert.org/vuls/id/753264|http://www.securitytracker.com/id/1034613|https://www.exploit-db.com/exploits/39231/ | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | progress/whatsup_gold | False | Unknown | nan |
CVE-2015-5254 | Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object. | 2016-01-08 | 2026-05-06 | CWE-20 | redhat/openshift:2.0|apache/activemq:5.0.0|apache/activemq:5.1.0|apache/activemq:5.2.0|apache/activemq:5.3.0|apache/activemq:5.3.1|apache/activemq:5.3.2|apache/activemq:5.4.0|apache/activemq:5.4.1|apache/activemq:5.4.3 | http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt|http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174371.html|http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174537.html|http://rhn.redhat.com/errata/RHSA-2016-0489.html|http://rhn.redhat.co... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | redhat/openshift | False | Unknown | nan |
CVE-2015-7554 | The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image. | 2016-01-08 | 2026-05-06 | CWE-254 | libtiff/libtiff:4.0.6 | http://lists.opensuse.org/opensuse-updates/2016-01/msg00078.html|http://lists.opensuse.org/opensuse-updates/2016-01/msg00081.html|http://lists.opensuse.org/opensuse-updates/2016-01/msg00100.html|http://packetstormsecurity.com/files/135078/libtiff-4.0.6-Invalid-Write.html|http://rhn.redhat.com/errata/RHSA-2016-1546.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | libtiff/libtiff | False | Unknown | nan |
CVE-2015-8668 | Heap-based buffer overflow in the PackBitsPreEncode function in tif_packbits.c in bmp2tiff in libtiff 4.0.6 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via a large width field in a BMP image. | 2016-01-08 | 2026-05-06 | CWE-787 | libtiff/libtiff:*|oracle/vm_server:3.3|oracle/vm_server:3.4|oracle/linux:6|oracle/linux:7|redhat/enterprise_linux:6.0|redhat/enterprise_linux:7.0|redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_desktop:7.0|redhat/enterprise_linux_workstation:6.0 | http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html|http://rhn.redhat.com/errata/RHSA-2016-1546.html|http://rhn.redhat.com/errata/RHSA-2016-1547.html|http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html|http://www.oracle.com/technetwork/topics/security/ovmbulletin... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Out-of-Bounds Write | Execution | 98.5 | CRITICAL | libtiff/libtiff | False | Unknown | nan |
CVE-2015-8753 | SAP Afaria 7.0.6001.5 allows remote attackers to bypass authorization checks and wipe or lock mobile devices via a crafted request, related to "Insecure signature," aka SAP Security Note 2134905. | 2016-01-08 | 2026-05-06 | CWE-264 | sap/afaria:7.0.6001.5 | https://erpscan.io/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/|https://erpscan.io/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/ | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | HIGH | HIGH | 3.9 | 5.2 | Other | Unknown | 80.0 | HIGH | sap/afaria | False | Unknown | nan |
CVE-2015-8761 | The Values module 7.x-1.x before 7.x-1.2 for Drupal does not properly check permissions, which allows remote administrators with the "Import value sets" permission to execute arbitrary PHP code via the exported values list in a ctools import. | 2016-01-08 | 2026-05-06 | CWE-94 | values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.1 | http://cgit.drupalcode.org/values/commit/?id=5942ee9|http://www.securityfocus.com/bid/79656|https://www.drupal.org/node/2622534|https://www.drupal.org/node/2636344|http://cgit.drupalcode.org/values/commit/?id=5942ee9 | False | 9.0 | CRITICAL | NETWORK | LOW | HIGH | NONE | CHANGED | LOW | HIGH | HIGH | 2.3 | 6.0 | Code Injection | Execution | 71.5 | HIGH | values_project/values | False | Unknown | nan |
CVE-2015-8557 | The FontManager._get_nix_font_path function in formatters/img.py in Pygments 1.2.2 through 2.0.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a font name. | 2016-01-08 | 2026-05-06 | CWE-78 | canonical/ubuntu_linux:12.04|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.04|canonical/ubuntu_linux:15.10|pygments/pygments:1.2.2|pygments/pygments:1.3|pygments/pygments:1.3.1|pygments/pygments:1.4|pygments/pygments:1.5|pygments/pygments:1.6 | http://packetstormsecurity.com/files/133823/Pygments-FontManager._get_nix_font_path-Shell-Injection.html|http://seclists.org/fulldisclosure/2015/Oct/4|http://www.debian.org/security/2016/dsa-3445|http://www.openwall.com/lists/oss-security/2015/12/14/17|http://www.openwall.com/lists/oss-security/2015/12/14/6 | False | 9.0 | CRITICAL | NETWORK | HIGH | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 2.2 | 6.0 | OS Command Injection | Execution | 71.0 | HIGH | canonical/ubuntu_linux | False | Unknown | nan |
CVE-2015-7512 | Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet. | 2016-01-08 | 2026-05-06 | CWE-120 | qemu/qemu:*|qemu/qemu:2.5.0|qemu/qemu:2.5.0|qemu/qemu:2.5.0|redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_eus:6.7|redhat/enterprise_linux_server:6.0|redhat/enterprise_linux_workstation:6.0|redhat/openstack:5.0|redhat/virtualization:3.0 | http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f|http://rhn.redhat.com/errata/RHSA-2015-2694.html|http://rhn.redhat.com/errata/RHSA-2015-2695.html|http://rhn.redhat.com/errata/RHSA-2015-2696.html|http://www.debian.org/security/2016/dsa-3469 | True | 9.0 | CRITICAL | NETWORK | HIGH | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 2.2 | 6.0 | Buffer Overflow | Unknown | 86.0 | CRITICAL | qemu/qemu | False | Unknown | nan |
CVE-2015-7541 | The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable. | 2016-01-08 | 2026-05-06 | CWE-77 | colorscore_project/colorscore:* | http://rubysec.com/advisories/CVE-2015-7541/|http://www.openwall.com/lists/oss-security/2016/01/05/2|https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718|http://rubysec.com/advisories/CVE-2015-7541/|http://www.openwall.com/lists/oss-security/2016/01/05/2 | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | Command Injection | Execution | 84.5 | HIGH | colorscore_project/colorscore | False | Unknown | nan |
CVE-2015-7938 | Advantech EKI-132x devices with firmware before 2015-12-31 allow remote attackers to bypass authentication via unspecified vectors. | 2016-01-09 | 2026-05-06 | CWE-287 | advantech/eki-1321_series_firmware:*|advantech/eki-1322_series_firmware:* | https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01|https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 83.5 | HIGH | advantech/eki-1321_series_firmware | False | Unknown | nan |
CVE-2015-7939 | Heap-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.09 allows remote attackers to execute arbitrary code via a long vlp filename. | 2016-01-09 | 2026-05-06 | CWE-119 | unitronics/visilogic_oplc_ide:* | http://www.zerodayinitiative.com/advisories/ZDI-16-001|https://ics-cert.us-cert.gov/advisories/ICSA-15-274-02A|http://www.zerodayinitiative.com/advisories/ZDI-16-001|https://ics-cert.us-cert.gov/advisories/ICSA-15-274-02A | False | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Buffer Overflow | Execution | 77.0 | HIGH | unitronics/visilogic_oplc_ide | False | Unknown | nan |
CVE-2015-8098 | F5 BIG-IP APM 11.4.1 before 11.4.1 HF9, 11.5.x before 11.5.3, and 11.6.0 before 11.6.0 HF4 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors related to processing a Citrix Remote Desktop connection through a virtual server configured with a remote desktop profile, aka... | 2016-01-12 | 2026-05-06 | CWE-119 | f5/big-ip_access_policy_manager:11.2.0|f5/big-ip_access_policy_manager:11.2.1|f5/big-ip_access_policy_manager:11.3.0|f5/big-ip_access_policy_manager:11.4.0|f5/big-ip_access_policy_manager:11.5.0|f5/big-ip_access_policy_manager:11.5.1|f5/big-ip_access_policy_manager:11.6.0 | http://www.securitytracker.com/id/1034609|https://support.f5.com/kb/en-us/solutions/public/k/43/sol43552605.html|http://www.securitytracker.com/id/1034609|https://support.f5.com/kb/en-us/solutions/public/k/43/sol43552605.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | f5/big-ip_access_policy_manager | False | Unknown | nan |
CVE-2015-8659 | The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug. | 2016-01-12 | 2026-05-06 | CWE-119 | apple/mac_os_x:*|nghttp2/nghttp2:*|apple/iphone_os:*|apple/tvos:*|apple/watchos:* | http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html|http://lists.fedoraproject.o... | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | Buffer Overflow | Execution | 84.5 | HIGH | apple/mac_os_x | False | Unknown | nan |
CVE-2015-8396 | Integer overflow in the ImageRegionReader::ReadIntoBuffer function in MediaStorageAndFileFormat/gdcmImageRegionReader.cxx in Grassroots DICOM (aka GDCM) before 2.6.2 allows attackers to execute arbitrary code via crafted header dimensions in a DICOM image file, which triggers a buffer overflow. | 2016-01-12 | 2026-05-06 | CWE-189 | malaterre/grassroots_dicom:*|malaterre/grassroots_dicom:2.6.1 | http://census-labs.com/news/2016/01/11/gdcm-buffer-overflow-imageregionreaderreadintobuffer/|http://packetstormsecurity.com/files/135205/GDCM-2.6.0-2.6.1-Integer-Overflow.html|http://seclists.org/fulldisclosure/2016/Jan/29|http://sourceforge.net/p/gdcm/gdcm/ci/e547b1ded3fd21e0b0ad149f13045aa12d4b9b7c/|http://sourceforg... | True | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | Other | Unknown | 99.5 | CRITICAL | malaterre/grassroots_dicom | False | Unknown | nan |
CVE-2015-8611 | BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, and PEM 12.0.0 before HF1 on the 2000, 4000, 5000, 7000, and 10000 platforms do not properly sync passwords with the Always-On Management (AOM) subsystem, which might allow remote attackers to obtain login access to AOM via an (1) expired or (2) default p... | 2016-01-12 | 2026-05-06 | CWE-255 | f5/big-ip_domain_name_system:12.0.0|f5/big-ip_application_acceleration_manager:12.0.0|f5/big-ip_link_controller:12.0.0|f5/big-ip_policy_enforcement_manager:12.0.0|f5/big-ip_advanced_firewall_manager:12.0.0|f5/big-ip_local_traffic_manager:12.0.0|f5/big-ip_access_policy_manager:12.0.0|f5/big-ip_application_security_manag... | http://www.securitytracker.com/id/1034629|https://support.f5.com/kb/en-us/solutions/public/k/05/sol05272632.html|http://www.securitytracker.com/id/1034629|https://support.f5.com/kb/en-us/solutions/public/k/05/sol05272632.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | f5/big-ip_domain_name_system | False | Unknown | nan |
CVE-2016-0003 | Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka "Microsoft Edge Memory Corruption Vulnerability." | 2016-01-13 | 2026-05-06 | CWE-119 | microsoft/edge:- | http://www.securitytracker.com/id/1034649|http://www.zerodayinitiative.com/advisories/ZDI-16-019|https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-002|http://www.securitytracker.com/id/1034649|http://www.zerodayinitiative.com/advisories/ZDI-16-019 | False | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Buffer Overflow | Execution | 77.0 | HIGH | microsoft/edge | False | Unknown | nan |
CVE-2016-0933 | Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-01-14 | 2026-05-06 | CWE-119 | adobe/acrobat_reader:*|adobe/acrobat_reader:11.0.0|adobe/acrobat_reader:11.0.1|adobe/acrobat_reader:11.0.2|adobe/acrobat_reader:11.0.3|adobe/acrobat_reader:11.0.4|adobe/acrobat_reader:11.0.5|adobe/acrobat_reader:11.0.6|adobe/acrobat_reader:11.0.7|adobe/acrobat_reader:11.0.8 | http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1217|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat_reader | False | Unknown | nan |
CVE-2016-0940 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-01-14 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat:11.0.0|adobe/acrobat:11.0.1|adobe/acrobat:11.0.2|adobe/acrobat:11.0.3|adobe/acrobat:11.0.4|adobe/acrobat:11.0.5|adobe/acrobat:11.0.6|adobe/acrobat:11.0.7|adobe/acrobat:11.0.8 | http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-0942 | Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-01-14 | 2026-05-06 | CWE-119 | adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat:*|adobe/acrobat:11.0.0|adobe/acrobat:11.0.1|adobe/acrobat:11.0.2|adobe/acrobat:11.0.3|adobe/acrobat:11.0.4 | http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat_dc | False | Unknown | nan |
CVE-2016-0944 | Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-01-14 | 2026-05-06 | CWE-119 | adobe/acrobat_reader:*|adobe/acrobat_reader:11.0.0|adobe/acrobat_reader:11.0.1|adobe/acrobat_reader:11.0.2|adobe/acrobat_reader:11.0.3|adobe/acrobat_reader:11.0.4|adobe/acrobat_reader:11.0.5|adobe/acrobat_reader:11.0.6|adobe/acrobat_reader:11.0.7|adobe/acrobat_reader:11.0.8 | http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat_reader | False | Unknown | nan |
CVE-2016-0945 | Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-01-14 | 2026-05-06 | CWE-119 | adobe/acrobat_reader:*|adobe/acrobat_reader:11.0.0|adobe/acrobat_reader:11.0.1|adobe/acrobat_reader:11.0.2|adobe/acrobat_reader:11.0.3|adobe/acrobat_reader:11.0.4|adobe/acrobat_reader:11.0.5|adobe/acrobat_reader:11.0.6|adobe/acrobat_reader:11.0.7|adobe/acrobat_reader:11.0.8 | http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat_reader | False | Unknown | nan |
CVE-2016-0946 | Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-01-14 | 2026-05-06 | CWE-119 | adobe/acrobat_reader:*|adobe/acrobat_reader:11.0.0|adobe/acrobat_reader:11.0.1|adobe/acrobat_reader:11.0.2|adobe/acrobat_reader:11.0.3|adobe/acrobat_reader:11.0.4|adobe/acrobat_reader:11.0.5|adobe/acrobat_reader:11.0.6|adobe/acrobat_reader:11.0.7|adobe/acrobat_reader:11.0.8 | http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat_reader | False | Unknown | nan |
CVE-2015-6314 | Cisco Wireless LAN Controller (WLC) devices with software 7.6.x, 8.0 before 8.0.121.0, and 8.1 before 8.1.131.0 allow remote attackers to change configuration settings via unspecified vectors, aka Bug ID CSCuw06153. | 2016-01-15 | 2026-05-06 | CWE-287 | cisco/wireless_lan_controller_software:8.0.72.140|cisco/wireless_lan_controller_software:8.0_base|cisco/wireless_lan_controller_software:8.1.0|cisco/wireless_lan_controller_software:8.1.104.37|cisco/wireless_lan_controller_software:8.1.111.0|cisco/wireless_lan_controller_software:8.1.122.0 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-wlc|http://www.securitytracker.com/id/1034665|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-wlc|http://www.securitytracker.com/id/1034665 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 83.5 | HIGH | cisco/wireless_lan_controller_software | False | Unknown | nan |
CVE-2015-6323 | The Admin portal in Cisco Identity Services Engine (ISE) 1.1.x, 1.2.0 before patch 17, 1.2.1 before patch 8, 1.3 before patch 5, and 1.4 before patch 4 allows remote attackers to obtain administrative access via unspecified vectors, aka Bug ID CSCuw34253. | 2016-01-15 | 2026-05-06 | UNKNOWN | cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.... | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-ise|http://www.securitytracker.com/id/1034666|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-ise|http://www.securitytracker.com/id/1034666 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | cisco/identity_services_engine_software | False | Unknown | nan |
CVE-2016-0854 | Unrestricted file upload vulnerability in the uploadImageCommon function in the UploadAjaxAction script in the WebAccess Dashboard Viewer in Advantech WebAccess before 8.1 allows remote attackers to write to files of arbitrary types via unspecified vectors. | 2016-01-15 | 2026-05-06 | UNKNOWN | advantech/webaccess:* | http://www.rapid7.com/db/modules/exploit/windows/scada/advantech_webaccess_dashboard_file_upload|http://www.zerodayinitiative.com/advisories/ZDI-16-127|http://www.zerodayinitiative.com/advisories/ZDI-16-128|http://www.zerodayinitiative.com/advisories/ZDI-16-129|https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | advantech/webaccess | False | Unknown | nan |
CVE-2016-0856 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to execute arbitrary code via unspecified vectors. | 2016-01-15 | 2026-05-06 | CWE-119 | advantech/webaccess:* | http://www.zerodayinitiative.com/advisories/ZDI-16-100|http://www.zerodayinitiative.com/advisories/ZDI-16-101|http://www.zerodayinitiative.com/advisories/ZDI-16-102|http://www.zerodayinitiative.com/advisories/ZDI-16-103|http://www.zerodayinitiative.com/advisories/ZDI-16-106 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | advantech/webaccess | False | Unknown | nan |
CVE-2016-0857 | Multiple heap-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to execute arbitrary code via unspecified vectors. | 2016-01-15 | 2026-05-06 | CWE-119 | advantech/webaccess:* | http://www.zerodayinitiative.com/advisories/ZDI-16-107|http://www.zerodayinitiative.com/advisories/ZDI-16-119|http://www.zerodayinitiative.com/advisories/ZDI-16-121|https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01|http://www.zerodayinitiative.com/advisories/ZDI-16-107 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | advantech/webaccess | False | Unknown | nan |
CVE-2016-0859 | Integer overflow in the Kernel service in Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted RPC request. | 2016-01-15 | 2026-05-06 | CWE-189 | advantech/webaccess:* | http://www.zerodayinitiative.com/advisories/ZDI-16-104|https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01|http://www.zerodayinitiative.com/advisories/ZDI-16-104|https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | advantech/webaccess | False | Unknown | nan |
CVE-2016-1909 | Fortinet FortiAnalyzer before 5.0.12 and 5.2.x before 5.2.5; FortiSwitch 3.3.x before 3.3.3; FortiCache 3.0.x before 3.0.8; and FortiOS 4.1.x before 4.1.11, 4.2.x before 4.2.16, 4.3.x before 4.3.17 and 5.0.x before 5.0.8 have a hardcoded passphrase for the Fortimanager_Access account, which allows remote attackers to o... | 2016-01-15 | 2026-05-06 | CWE-264 | fortinet/fortios:*|fortinet/fortios:5.0|fortinet/fortios:5.0.0|fortinet/fortios:5.0.1|fortinet/fortios:5.0.2|fortinet/fortios:5.0.3|fortinet/fortios:5.0.4|fortinet/fortios:5.0.5|fortinet/fortios:5.0.6|fortinet/fortios:5.0.7 | http://blog.fortinet.com/post/brief-statement-regarding-issues-found-with-fortios|http://packetstormsecurity.com/files/135225/FortiGate-OS-5.0.7-SSH-Backdoor.html|http://seclists.org/fulldisclosure/2016/Jan/26|http://www.fortiguard.com/advisory/multiple-products-ssh-undocumented-login-vulnerability|http://www.securityt... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | fortinet/fortios | False | Unknown | nan |
CVE-2016-1142 | Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors. | 2016-01-16 | 2026-05-06 | CWE-78 | seeds/acmailer:*|seeds/acmailer:3.9.0|seeds/acmailer:3.9.1|seeds/acmailer:3.9.2|seeds/acmailer:3.9.3|seeds/acmailer:3.9.4|seeds/acmailer:3.9.5|seeds/acmailer:3.9.6|seeds/acmailer:3.9.7|seeds/acmailer:3.9.8 | http://jvn.jp/en/jp/JVN50899877/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002|http://www.acmailer.jp/info/de.cgi?id=64|http://jvn.jp/en/jp/JVN50899877/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002 | False | 9.1 | CRITICAL | NETWORK | LOW | HIGH | NONE | CHANGED | HIGH | HIGH | HIGH | 2.3 | 6.0 | OS Command Injection | Execution | 72.0 | HIGH | seeds/acmailer | False | Unknown | nan |
CVE-2015-8617 | Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling. | 2016-01-19 | 2026-05-06 | CWE-134 | php/php:7.0.1 | http://php.net/ChangeLog-7.php|http://www.securitytracker.com/id/1034543|https://bugs.php.net/bug.php?id=71105|https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-1903 | The gdImageRotateInterpolated function in ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a large bgd_color argument to the imagerotate func... | 2016-01-19 | 2026-05-06 | CWE-119|CWE-200 | php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html|http://rhn.redhat.com/errata/RHSA-2016-2750.html|http://www.openwall.com/lists/oss-security/2016/01/14/8|http://www.php.net/ChangeLog-5.php | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | Buffer Overflow | Execution | 95.0 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-1901 | Integer overflow in the authenticate_post function in CGit before 0.12 allows remote attackers to have unspecified impact via a large value in the Content-Length HTTP header, which triggers a buffer overflow. | 2016-01-20 | 2026-05-06 | CWE-119 | fedoraproject/fedora:22|cgit_project/cgit:* | http://git.zx2c4.com/cgit/commit/?id=4458abf64172a62b92810c2293450106e6dfc763|http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176167.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176198.html|http://lists.opensuse.org/opensuse-updates/2016-01/msg00067.html|http://list... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | fedoraproject/fedora | False | Unknown | nan |
CVE-2016-1928 | Buffer overflow in the XS engine (hdbxsengine) in SAP HANA allows remote attackers to cause a denial of service or execute arbitrary code via a crafted HTTP request, related to JSON, aka SAP Security Note 2241978. | 2016-01-20 | 2026-05-06 | CWE-119 | sap/hana:- | http://seclists.org/fulldisclosure/2016/Apr/65|http://www.securityfocus.com/archive/1/538212/100/0/threaded|https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/|https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/|http://seclists.org/fulldisclosure/2016/Apr/65 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | sap/hana | False | Unknown | nan |
CVE-2016-1929 | The XS engine in SAP HANA allows remote attackers to spoof log entries in trace files and consequently cause a denial of service (disk consumption and process crash) via a crafted HTTP request, related to an unspecified debug function, aka SAP Security Note 2241978. | 2016-01-20 | 2026-05-06 | CWE-20 | sap/hana:- | http://seclists.org/fulldisclosure/2016/Apr/59|https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/|https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/|http://seclists.org/fulldisclosure/2016/Apr/59|https://erpscan.io/advisories/erpscan-16-002-sap-hana-lo... | False | 9.3 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | NONE | LOW | HIGH | 3.9 | 4.7 | Improper Input Validation | Unknown | 81.0 | HIGH | sap/hana | False | Unknown | nan |
CVE-2015-6412 | Cisco Modular Encoding Platform D9036 Software before 02.04.70 has hardcoded (1) root and (2) guest passwords, which makes it easier for remote attackers to obtain access via an SSH session, aka Bug ID CSCut88070. | 2016-01-22 | 2026-05-06 | CWE-255 | cisco/modular_encoding_platform_d9036_software:02.00.80|cisco/modular_encoding_platform_d9036_software:02.01.50|cisco/modular_encoding_platform_d9036_software:02.02.30|cisco/modular_encoding_platform_d9036_software:02.03.30 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-d9036|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-d9036 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | cisco/modular_encoding_platform_d9036_software | False | Unknown | nan |
CVE-2015-6435 | An unspecified CGI script in Cisco FX-OS before 1.1.2 on Firepower 9000 devices and Cisco Unified Computing System (UCS) Manager before 2.2(4b), 2.2(5) before 2.2(5a), and 3.0 before 3.0(2e) allows remote attackers to execute arbitrary shell commands via a crafted HTTP request, aka Bug ID CSCur90888. | 2016-01-22 | 2026-05-06 | CWE-78 | cisco/firepower_extensible_operating_system:1.1\(1.86\)|cisco/firepower_extensible_operating_system:1.1\(1.160\)|cisco/firepower_extensible_operating_system:1.1.1|cisco/unified_computing_system:1.0\(2k\)|cisco/unified_computing_system:1.0_base|cisco/unified_computing_system:1.1\(1m\)|cisco/unified_computing_system:1.1_... | http://packetstormsecurity.com/files/160991/Cisco-UCS-Manager-2.2-1d-Remote-Command-Execution.html|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-ucsm|http://www.securitytracker.com/id/1034743|http://packetstormsecurity.com/files/160991/Cisco-UCS-Manager-2.2-1d-Remote-Command-Exe... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | OS Command Injection | Execution | 98.5 | CRITICAL | cisco/firepower_extensible_operating_system | False | Unknown | nan |
CVE-2015-8362 | The setUpSubtleUserAccount function in /bin/bw on Harman AMX devices before 2015-10-12 has a hardcoded password for the BlackWidow account, which makes it easier for remote attackers to obtain access via a (1) SSH or (2) HTTP session, a different vulnerability than CVE-2016-1984. | 2016-01-22 | 2026-05-06 | CWE-255 | harman/amx_firmware:1.2.322|harman/amx_firmware:1.3.100 | http://blog.sec-consult.com/2016/01/deliberately-hidden-backdoor-account-in.html|http://seclists.org/fulldisclosure/2016/Jan/63|http://www.amx.com/techcenter/NXSecurityBrief/|http://www.amx.com/techcenter/firmware.asp?Category=Hot%20Fix%20Files|http://www.securityfocus.com/archive/1/537343/100/0/threaded | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | harman/amx_firmware | False | Unknown | nan |
CVE-2016-1984 | The setUpSubtleUserAccount function in /bin/bw on Harman AMX devices before 2016-01-20 has a hardcoded password for the 1MB@tMaN account, which makes it easier for remote attackers to obtain access via a (1) SSH or (2) HTTP session, a different vulnerability than CVE-2015-8362. | 2016-01-22 | 2026-05-06 | CWE-255 | harman/amx_firmware:1.2.322|harman/amx_firmware:1.3.100 | http://blog.sec-consult.com/2016/01/deliberately-hidden-backdoor-account-in.html|http://seclists.org/fulldisclosure/2016/Jan/63|http://www.amx.com/techcenter/NXSecurityBrief/|http://www.amx.com/techcenter/firmware.asp?Category=Hot%20Fix%20Files|https://ics-cert.us-cert.gov/advisories/ICSA-16-049-02 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | harman/amx_firmware | False | Unknown | nan |
CVE-2016-2051 | Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | 2016-01-25 | 2026-05-06 | UNKNOWN | google/chrome:*|redhat/enterprise_linux_desktop_supplementary:6.0|redhat/enterprise_linux_server_supplementary:6.0|redhat/enterprise_linux_server_supplementary_eus:6.7.z|redhat/enterprise_linux_workstation_supplementary:6.0 | http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html|http://rhn.redhat.com/errata/RHSA-2016-0072.html|http://www.securityfocus.com/bid/81431|http://www.securitytracker.com/id/1034801|http://www.ubuntu.com/usn/USN-2877-1 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-1896 | Race condition in the initialization process on Lexmark printers with firmware ATL before ATL.02.049, CB before CB.02.049, PP before PP.02.049, and YK before YK.02.049 allows remote attackers to bypass authentication by leveraging incorrect detection of the security-jumper status. | 2016-01-27 | 2026-05-06 | CWE-254|CWE-264 | lexmark/printer_firmware:*|lexmark/printer_firmware:*|lexmark/printer_firmware:*|lexmark/printer_firmware:* | http://support.lexmark.com/index?page=content&id=TE745|http://support.lexmark.com/index?page=content&id=TE745 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | lexmark/printer_firmware | False | Unknown | nan |
CVE-2015-6319 | SQL injection vulnerability in the web-based management interface on Cisco RV220W devices allows remote attackers to execute arbitrary SQL commands via a crafted header in an HTTP request, aka Bug ID CSCuv29574. | 2016-01-27 | 2026-05-06 | CWE-89 | cisco/rv_series_router_firmware:1.0.0.2|cisco/rv_series_router_firmware:1.0.0.30|cisco/rv_series_router_firmware:1.0.1.9|cisco/rv_series_router_firmware:1.0.2.6|cisco/rv_series_router_firmware:1.0.3.10|cisco/rv_series_router_firmware:1.0.4.10|cisco/rv_series_router_firmware:1.0.4.14|cisco/rv_series_router_firmware:1.0.... | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220|http://www.securitytracker.com/id/1034830|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220|http://www.securitytracker.com/id/1034830 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 83.5 | HIGH | cisco/rv_series_router_firmware | False | Unknown | nan |
CVE-2016-0868 | Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 15.000 and B before 15.002 allows remote attackers to execute arbitrary code via a crafted web request. | 2016-01-28 | 2026-05-06 | CWE-119 | rockwellautomation/1763-l16awa_series_a:15.000|rockwellautomation/1763-l16awa_series_b:15.000|rockwellautomation/1763-l16bbb_series_a:15.000|rockwellautomation/1763-l16bbb_series_b:15.000|rockwellautomation/1763-l16bwa_series_a:15.000|rockwellautomation/1763-l16bwa_series_b:15.000|rockwellautomation/1763-l16dwd_series_... | http://www.securitytracker.com/id/1034861|https://ics-cert.us-cert.gov/advisories/ICSA-16-026-02|http://www.securitytracker.com/id/1034861|https://ics-cert.us-cert.gov/advisories/ICSA-16-026-02 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | rockwellautomation/1763-l16awa_series_a | False | Unknown | nan |
CVE-2015-8789 | Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document. | 2016-01-29 | 2026-05-06 | UNKNOWN | matroska/libebml:* | http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html|http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html|http://www.debian.org/security/2016/dsa-3538|http://www.securityfocus.com/bid/94924|http://www.talosintelligence.com/reports/TALOS-2016-0037/ | False | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Unknown | Unknown | 77.0 | HIGH | matroska/libebml | False | Unknown | nan |
CVE-2015-8772 | McPvDrv.sys 4.6.111.0 in McAfee File Lock 5.x in McAfee Total Protection allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a large VERIFY_INFORMATION.Length value in an IOCTL_DISK_VERIFY ioctl call. | 2016-01-29 | 2026-05-06 | CWE-19 | mcafee/file_lock:5.0 | http://seclists.org/fulldisclosure/2016/Jan/90|https://www.nettitude.co.uk/mcafee-file-lock-driver-kernel-memory-leak/|http://seclists.org/fulldisclosure/2016/Jan/90|https://www.nettitude.co.uk/mcafee-file-lock-driver-kernel-memory-leak/ | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | Other | Unknown | 80.0 | HIGH | mcafee/file_lock | False | Unknown | nan |
CVE-2015-7923 | Westermo WeOS before 4.19.0 uses the same SSL private key across different customers' installations, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a key. | 2016-01-30 | 2026-05-06 | CWE-310 | westermo/weos:4.18.0 | https://ics-cert.us-cert.gov/advisories/ICSA-16-028-01|https://ics-cert.us-cert.gov/advisories/ICSA-16-028-01 | True | 9.0 | CRITICAL | NETWORK | HIGH | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 2.2 | 6.0 | Other | Unknown | 86.0 | CRITICAL | westermo/weos | False | Unknown | nan |
CVE-2016-1985 | HPE Operations Manager 8.x and 9.0 on Windows allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library. | 2016-01-30 | 2026-05-06 | CWE-94 | hp/operations_manager:8.1|hp/operations_manager:8.10|hp/operations_manager:8.16|hp/operations_manager:9.0 | http://www.securityfocus.com/bid/82259|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953244|http://www.securityfocus.com/bid/82259|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953244 | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | Code Injection | Execution | 84.5 | HIGH | hp/operations_manager | False | Unknown | nan |
CVE-2016-1930 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | 2016-01-31 | 2026-05-06 | CWE-119 | mozilla/firefox:*|oracle/linux:5.0|oracle/linux:6|oracle/linux:7|mozilla/firefox:38.0|mozilla/firefox:38.1.0|mozilla/firefox:38.2.0|mozilla/firefox:38.3.0|mozilla/firefox:38.4.0|mozilla/firefox:38.5.0 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html|http://lists.opensus... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | mozilla/firefox | False | Unknown | nan |
CVE-2016-1931 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vec... | 2016-01-31 | 2026-05-06 | CWE-119 | mozilla/firefox:*|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html|http://www.mozilla.org/security/announce/2016/mfsa2016-01.html|http://www.securityfocus.com/bid/81953|http://www.securitytracker.com/id/1034825 | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | Buffer Overflow | Execution | 84.5 | HIGH | mozilla/firefox | False | Unknown | nan |
CVE-2016-1944 | The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | 2016-01-31 | 2026-05-06 | CWE-119 | mozilla/firefox:43.0.4|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html|http://www.mozilla.org/security/announce/2016/mfsa2016-10.html|http://www.securityfocus.com/bid/81950|http://www.securitytracker.com/id/1034825 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | mozilla/firefox | False | Unknown | nan |
CVE-2016-1946 | The MoofParser::Metadata function in binding/MoofParser.cpp in libstagefright in Mozilla Firefox before 44.0 does not limit the size of read operations, which might allow remote attackers to cause a denial of service (integer overflow and buffer overflow) or possibly have unspecified other impact via crafted metadata. | 2016-01-31 | 2026-05-06 | CWE-119|CWE-189 | opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2|mozilla/firefox:* | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html|http://www.mozilla.org/security/announce/2016/mfsa2016-10.html|http://www.securityfocus.com/bid/81950|http://www.securitytracker.com/id/1034825 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | opensuse/leap | False | Unknown | nan |
CVE-2015-5344 | The camel-xstream component in Apache Camel before 2.15.5 and 2.16.x before 2.16.1 allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request. | 2016-02-03 | 2026-05-06 | CWE-19 | apache/camel:*|apache/camel:2.16.0 | http://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc|http://rhn.redhat.com/errata/RHSA-2016-2035.html|http://www.securityfocus.com/archive/1/537414/100/0/threaded|http://www.securityfocus.com/bid/82260|https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Cc... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | apache/camel | False | Unknown | nan |
CVE-2015-8747 | The multifilesystem storage backend in Radicale before 1.1 allows remote attackers to read or write to arbitrary files via a crafted component name. | 2016-02-03 | 2026-05-06 | CWE-20 | radicale/radicale:* | http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175738.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175776.html|http://www.debian.org/security/2016/dsa-3462|http://www.openwall.com/lists/oss-security/2016/01/05/7|http://www.openwall.com/lists/oss-security/2016/01/06... | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | NONE | 3.9 | 5.8 | Improper Input Validation | Unknown | 84.5 | HIGH | radicale/radicale | False | Unknown | nan |
CVE-2016-1505 | The filesystem storage backend in Radicale before 1.1 on Windows allows remote attackers to read or write to arbitrary files via a crafted path, as demonstrated by /c:/file/ignore. | 2016-02-03 | 2026-05-06 | CWE-21 | radicale/radicale:* | http://www.openwall.com/lists/oss-security/2016/01/05/7|http://www.openwall.com/lists/oss-security/2016/01/06/4|http://www.openwall.com/lists/oss-security/2016/01/06/7|http://www.openwall.com/lists/oss-security/2016/01/07/7|http://www.securityfocus.com/bid/80255 | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | NONE | 3.9 | 5.8 | Other | Unknown | 84.5 | HIGH | radicale/radicale | False | Unknown | nan |
CVE-2016-1906 | Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed. | 2016-02-03 | 2026-05-06 | CWE-264 | kubernetes/kubernetes:- | https://access.redhat.com/errata/RHSA-2016:0070|https://access.redhat.com/errata/RHSA-2016:0351|https://github.com/openshift/origin/issues/6556|https://github.com/openshift/origin/pull/6576|https://access.redhat.com/errata/RHSA-2016:0070 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | kubernetes/kubernetes | False | Unknown | nan |
CVE-2015-7915 | Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 sends cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network. | 2016-02-06 | 2026-05-06 | CWE-200|CWE-255 | sauter/moduweb_vision:* | http://seclists.org/fulldisclosure/2016/Feb/25|https://ics-cert.us-cert.gov/advisories/ICSA-16-033-01|http://seclists.org/fulldisclosure/2016/Feb/25|https://ics-cert.us-cert.gov/advisories/ICSA-16-033-01 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Information Disclosure | Collection | 98.5 | CRITICAL | sauter/moduweb_vision | False | Unknown | nan |
CVE-2016-0801 | The Broadcom Wi-Fi driver in the kernel in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49G, and 6.x before 2016-02-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted wireless control message packets, aka internal bug 25662029. | 2016-02-07 | 2026-05-06 | CWE-20 | apple/iphone_os:*|apple/mac_os_x:*|apple/tvos:*|apple/watchos:*|google/android:4.4.4|google/android:5.0|google/android:5.1.1|google/android:6.0|google/android:6.0.1 | http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html|http://source.android.com/se... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | apple/iphone_os | False | Unknown | nan |
CVE-2016-0803 | libstagefright in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49G, and 6.x before 2016-02-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file that triggers a large memory allocation in the (1) SoftMPEG4Encoder or (2) SoftVPXEnco... | 2016-02-07 | 2026-05-06 | CWE-119 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-02-01.html|https://android.googlesource.com/platform%2Fframeworks%2Fav/+/50270d98e26fa18b20ca88216c3526667b724ba7|http://source.android.com/security/bulletin/2016-02-01.html|https://android.googlesource.com/platform%2Fframeworks%2Fav/+/50270d98e26fa18b20ca88216c3526667b7... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-0804 | The NuPlayer::GenericSource::notifyPreparedAndCleanup function in media/libmediaplayerservice/nuplayer/GenericSource.cpp in mediaserver in Android 5.x before 5.1.1 LMY49G and 6.x before 2016-02-01 improperly manages mDrmManagerClient objects, which allows remote attackers to execute arbitrary code or cause a denial of ... | 2016-02-07 | 2026-05-06 | CWE-119 | google/android:5.0|google/android:5.0.1|google/android:5.0.2|google/android:5.1|google/android:5.1.0|google/android:5.1.1|google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-02-01.html|https://android.googlesource.com/platform%2Fframeworks%2Fav/+/224858e719d045c8554856b12c4ab73d2375cf33|http://source.android.com/security/bulletin/2016-02-01.html|https://android.googlesource.com/platform%2Fframeworks%2Fav/+/224858e719d045c8554856b12c4ab73d237... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2015-8787 | The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a relate... | 2016-02-08 | 2026-05-06 | CWE-476 | linux/linux_kernel:*|linux/linux_kernel:* | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f9cd81436c85d8c3a318ba92e236ede73752fc|http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html|http://lists.opensuse.org/opensuse-se... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | NULL Pointer Dereference | Unknown | 98.5 | CRITICAL | linux/linux_kernel | False | Unknown | nan |
CVE-2016-2230 | OpenELEC and RasPlex devices have a hardcoded password for the root account, which makes it easier for remote attackers to obtain access via an SSH session. | 2016-02-08 | 2026-05-06 | CWE-255 | openelec/openelec:* | http://www.kb.cert.org/vuls/id/544527|https://github.com/RasPlex/RasPlex/issues/453|http://www.kb.cert.org/vuls/id/544527|https://github.com/RasPlex/RasPlex/issues/453 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | openelec/openelec | False | Unknown | nan |
CVE-2014-9757 | The Ignite Realtime Smack XMPP API, as used in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0, allows remote configured XMPP servers to execute arbitrary Java code via serialized data in an XMPP message. | 2016-02-08 | 2026-05-06 | CWE-20 | atlassian/bamboo:2.4|atlassian/bamboo:2.4.1|atlassian/bamboo:2.4.2|atlassian/bamboo:2.4.3|atlassian/bamboo:2.5|atlassian/bamboo:2.5.1|atlassian/bamboo:2.5.2|atlassian/bamboo:2.5.3|atlassian/bamboo:2.5.5|atlassian/bamboo:2.6 | http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html|http://www.securityfocus.com/archive/1/537347/100/0/threaded|https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html|https://jira.atlassian.com/browse/BAM-17099|http://packetstormsecu... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | atlassian/bamboo | False | Unknown | nan |
CVE-2015-3252 | Apache CloudStack before 4.5.2 does not properly preserve VNC passwords when migrating KVM virtual machines, which allows remote attackers to gain access by connecting to the VNC server. | 2016-02-08 | 2026-05-06 | CWE-255 | apache/cloudstack:* | http://mail-archives.apache.org/mod_mbox/cloudstack-users/201602.mbox/%3C7508580E-3D83-49FD-BE6E-B329B0503130%40gmail.com%3E|http://www.securityfocus.com/archive/1/537459/100/0/threaded|https://blogs.apache.org/cloudstack/entry/two_late_announced_security_advisories|http://mail-archives.apache.org/mod_mbox/cloudstack-u... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | apache/cloudstack | False | Unknown | nan |
CVE-2015-8360 | An unspecified resource in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 allows remote attackers to execute arbitrary Java code via serialized data to the JMS port. | 2016-02-08 | 2026-05-06 | CWE-20 | atlassian/bamboo:2.3.1|atlassian/bamboo:2.4|atlassian/bamboo:2.4.1|atlassian/bamboo:2.4.2|atlassian/bamboo:2.4.3|atlassian/bamboo:2.5|atlassian/bamboo:2.5.1|atlassian/bamboo:2.5.2|atlassian/bamboo:2.5.3|atlassian/bamboo:2.5.5 | http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html|http://www.securityfocus.com/archive/1/537347/100/0/threaded|https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html|https://jira.atlassian.com/browse/BAM-17101|http://packetstormsecu... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | atlassian/bamboo | False | Unknown | nan |
CVE-2015-8361 | Multiple unspecified services in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 do not require authentication, which allows remote attackers to obtain sensitive information, modify settings, or manage build agents via unknown vectors involving the JMS port. | 2016-02-08 | 2026-05-06 | CWE-284 | atlassian/bamboo:2.4|atlassian/bamboo:2.4.1|atlassian/bamboo:2.4.2|atlassian/bamboo:2.4.3|atlassian/bamboo:2.5|atlassian/bamboo:2.5.1|atlassian/bamboo:2.5.2|atlassian/bamboo:2.5.3|atlassian/bamboo:2.5.5|atlassian/bamboo:2.6 | http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html|http://www.securityfocus.com/archive/1/537347/100/0/threaded|https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html|https://jira.atlassian.com/browse/BAM-17102|http://packetstormsecu... | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Other | Unknown | 80.0 | HIGH | atlassian/bamboo | False | Unknown | nan |
CVE-2016-0949 | Adobe Connect before 9.5.2 allows remote attackers to have an unspecified impact via a crafted parameter in a URL. | 2016-02-10 | 2026-05-06 | UNKNOWN | adobe/connect:* | http://www.securitytracker.com/id/1034978|https://helpx.adobe.com/security/products/connect/apsb16-07.html|http://www.securitytracker.com/id/1034978|https://helpx.adobe.com/security/products/connect/apsb16-07.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/connect | False | Unknown | nan |
CVE-2016-0951 | Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0952 and CVE-2016-0953. | 2016-02-10 | 2026-05-06 | CWE-119 | adobe/bridge_cc:*|adobe/photoshop_cc:* | http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html|https://www.exploit-db.com/exploits/39429/|http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/bridge_cc | False | Unknown | nan |
CVE-2016-0952 | Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0951 and CVE-2016-0953. | 2016-02-10 | 2026-05-06 | CWE-119 | adobe/bridge_cc:*|adobe/photoshop_cc:* | http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html|https://www.exploit-db.com/exploits/39430/|http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/bridge_cc | False | Unknown | nan |
CVE-2016-0953 | Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0951 and CVE-2016-0952. | 2016-02-10 | 2026-05-06 | CWE-119 | adobe/bridge_cc:*|adobe/photoshop_cc:* | http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html|https://www.exploit-db.com/exploits/39431/|http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/bridge_cc | False | Unknown | nan |
CVE-2016-1287 | Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Cata... | 2016-02-11 | 2026-05-06 | CWE-119 | cisco/adaptive_security_appliance_software:7.2.1|cisco/adaptive_security_appliance_software:7.2.1.9|cisco/adaptive_security_appliance_software:7.2.1.13|cisco/adaptive_security_appliance_software:7.2.1.19|cisco/adaptive_security_appliance_software:7.2.1.24|cisco/adaptive_security_appliance_software:7.2.2|cisco/adaptive_... | http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike|http://www.securitytracker.com/id/1034997|https://blog.exodusintel.com/2016/02/10/firewall-hacking/|https://www.exploit-db.com/ex... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | cisco/adaptive_security_appliance_software | False | Unknown | nan |
CVE-2016-1986 | HP Continuous Delivery Automation (CDA) 1.30 allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library. | 2016-02-12 | 2026-05-06 | CWE-94 | hp/continuous_delivery_automation:1.3.0 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04958567|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04958567 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Code Injection | Execution | 83.5 | HIGH | hp/continuous_delivery_automation | False | Unknown | nan |
CVE-2016-1524 | Multiple unrestricted file upload vulnerabilities in NETGEAR Management System NMS300 1.5.0.11 and earlier allow remote attackers to execute arbitrary Java code by using (1) fileUpload.do or (2) lib-1.0/external/flash/fileUpload.do to upload a JSP file, and then accessing it via a direct request for a /null URI. | 2016-02-13 | 2026-05-06 | UNKNOWN | netgear/prosafe_network_management_software_300:* | http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html|http://seclists.org/fulldisclosure/2016/Feb/30|http://www.kb.cert.org/vuls/id/777024|http://www.securityfocus.com/archive/1/537446/100/0/threaded|https://www.exploit-db.com/exploits/39412/ | True | 9.6 | CRITICAL | ADJACENT_NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Unknown | Unknown | 87.0 | CRITICAL | netgear/prosafe_network_management_software_300 | False | Unknown | nan |
CVE-2016-2231 | The Windows-based Host Interface Program (WHIP) service on Huawei SmartAX MT882 devices V200R002B022 Arg relies on the client to send a length field that is consistent with a buffer size, which allows remote attackers to cause a denial of service (device outage) or possibly have unspecified other impact via crafted tra... | 2016-02-15 | 2026-05-06 | CWE-19 | huawei/mt882_firmware:* | https://debihiga.wordpress.com/sa-whip/|https://debihiga.wordpress.com/sa-whip/ | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | huawei/mt882_firmware | False | Unknown | nan |
CVE-2016-0746 | Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing. | 2016-02-15 | 2026-05-06 | CWE-416 | f5/nginx:*|f5/nginx:*|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|debian/debian_linux:7.0|debian/debian_linux:8.0|debian/debian_linux:9.0|opensuse/leap:42.1|apple/xcode:* | http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html|http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html|http://seclists.org/fulldisclosure/2021/Sep/36|http://www.debian.org/security/2016/dsa-3473|http://www.securitytracker.com/id/1034869 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | f5/nginx | False | Unknown | nan |
CVE-2016-2386 | SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2101079. | 2016-02-16 | 2026-04-21 | CWE-89|CWE-89 | sap/netweaver_application_server_java:7.40 | http://packetstormsecurity.com/files/137129/SAP-NetWeaver-AS-JAVA-7.5-SQL-Injection.html|http://seclists.org/fulldisclosure/2016/May/56|https://erpscan.io/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/|https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/|https://github... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 100.0 | CRITICAL | sap/netweaver_application_server_java | True | Unknown | Apply updates per vendor instructions. |
CVE-2016-2071 | Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 11.x before 11.0 Build 64.34, 10.5 before 10.5 Build 59.13, and 10.5.e before Build 59.1305.e allows remote attackers to gain privileges via unspecified NS Web GUI commands. | 2016-02-17 | 2026-05-06 | CWE-264 | citrix/netscaler:10.5|citrix/netscaler:10.5e|citrix/netscaler:11.0|citrix/netscaler:10.5|citrix/netscaler:10.5e|citrix/netscaler:11.0 | http://support.citrix.com/article/CTX206001|http://www.securitytracker.com/id/1035098|http://support.citrix.com/article/CTX206001|http://www.securitytracker.com/id/1035098 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | citrix/netscaler | False | Unknown | nan |
CVE-2016-2396 | The GMS ViewPoint (GMSVP) web application in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote authenticated users to execute arbitrary commands via vectors related to configuration input. | 2016-02-17 | 2026-05-06 | CWE-77 | sonicwall/analyzer:7.2|sonicwall/analyzer:8.0|sonicwall/analyzer:8.1|sonicwall/global_management_system:7.2|sonicwall/global_management_system:8.0|sonicwall/global_management_system:8.1|sonicwall/uma_em5000_firmware:7.2|sonicwall/uma_em5000_firmware:8.0|sonicwall/uma_em5000_firmware:8.1 | http://www.securitytracker.com/id/1035015|http://www.zerodayinitiative.com/advisories/ZDI-16-164|https://support.software.dell.com/product-notification/185943|http://www.securitytracker.com/id/1035015|http://www.zerodayinitiative.com/advisories/ZDI-16-164 | False | 9.9 | CRITICAL | NETWORK | LOW | LOW | NONE | CHANGED | HIGH | HIGH | HIGH | 3.1 | 6.0 | Command Injection | Execution | 80.0 | HIGH | sonicwall/analyzer | False | Unknown | nan |
CVE-2016-2397 | The cliserver implementation in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote attackers to deserialize and execute arbitrary Java code via crafted XML data. | 2016-02-17 | 2026-05-06 | CWE-77 | sonicwall/uma_em5000_firmware:7.2|sonicwall/uma_em5000_firmware:8.0|sonicwall/uma_em5000_firmware:8.1|sonicwall/analyzer:7.2|sonicwall/analyzer:8.0|sonicwall/analyzer:8.1|sonicwall/global_management_system:7.2|sonicwall/global_management_system:8.0|sonicwall/global_management_system:8.1 | http://www.securitytracker.com/id/1035015|http://www.zerodayinitiative.com/advisories/ZDI-16-163|https://support.software.dell.com/product-notification/185943|http://www.securitytracker.com/id/1035015|http://www.zerodayinitiative.com/advisories/ZDI-16-163 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Command Injection | Execution | 98.5 | CRITICAL | sonicwall/uma_em5000_firmware | False | Unknown | nan |
CVE-2015-8286 | Zhuhai RaySharp firmware has a hardcoded root password, which makes it easier for remote attackers to obtain access via a session on TCP port 23 or 9000. | 2016-02-18 | 2026-05-06 | CWE-254 | zhuhai/raysharp_firmware:* | http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html|http://seclists.org/bugtraq/2015/Jun/117|http://www.forbes.com/sites/andygreenberg/2013/01/28/more-than-a-dozen-brands-of-security-camera-systems-vulnerable-to-hacker-hijacking/|http://www.kb.cert.org/vuls/id/899080|http://www.kb.cert.org/vuls/i... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | zhuhai/raysharp_firmware | False | Unknown | nan |
CVE-2015-8151 | Symantec Encryption Management Server (SEMS) 3.3.2 before MP12 allows remote authenticated users to execute arbitrary OS commands by leveraging console administrator access. | 2016-02-18 | 2026-05-06 | CWE-78 | symantec/encryption_management_server:* | http://www.securityfocus.com/bid/83268|http://www.securitytracker.com/id/1035063|http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160218_00|http://www.securityfocus.com/bid/83268|http://www.securitytracker.com/id/1035063 | False | 9.1 | CRITICAL | NETWORK | LOW | HIGH | NONE | CHANGED | HIGH | HIGH | HIGH | 2.3 | 6.0 | OS Command Injection | Execution | 72.0 | HIGH | symantec/encryption_management_server | False | Unknown | nan |
CVE-2016-1154 | SQL injection vulnerability in the Help plug-in 1.3.5 and earlier in Cuore EC-CUBE allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | 2016-02-19 | 2026-05-06 | CWE-89 | cuore/ec-cube_help_plugin:* | http://jvn.jp/en/jp/JVN31524757/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000027|http://www.ec-cube.net/products/detail.php?product_id=279|http://jvn.jp/en/jp/JVN31524757/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000027 | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | SQL Injection | Initial Access | 80.0 | HIGH | cuore/ec-cube_help_plugin | False | Unknown | nan |
CVE-2016-2275 | The web interface on Advantech/B+B SmartWorx VESP211-EU devices with firmware 1.7.2 and VESP211-232 devices with firmware 1.5.1 and 1.7.2 relies on the client to implement access control, which allows remote attackers to perform administrative actions via modified JavaScript code. | 2016-02-21 | 2026-05-06 | CWE-284 | advantech/vesp211-eu_firmware:1.7.2|advantech/vesp211-232_firmware:1.5.1|advantech/vesp211-232_firmware:1.7.2 | https://ics-cert.us-cert.gov/advisories/ICSA-16-049-01|https://ics-cert.us-cert.gov/advisories/ICSA-16-049-01 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | advantech/vesp211-eu_firmware | False | Unknown | nan |
CVE-2015-7425 | The Data Protection component in the VMware vSphere GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 6.3 before 6.3.2.5, 6.4 before 6.4.3.1, and 7.1 before 7.1.4 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Sn... | 2016-02-21 | 2026-05-06 | CWE-264 | ibm/tivoli_storage_flashcopy_manager_for_vmware:3.1|ibm/tivoli_storage_flashcopy_manager_for_vmware:3.1.1|ibm/tivoli_storage_flashcopy_manager_for_vmware:3.2|ibm/tivoli_storage_flashcopy_manager_for_vmware:6.3|ibm/tivoli_storage_flashcopy_manager_for_vmware:6.4|ibm/tivoli_storage_flashcopy_manager_for_vmware:6.4.2|ibm/... | http://www-01.ibm.com/support/docview.wss?uid=swg21973086|http://www.securityfocus.com/bid/79545|http://www-01.ibm.com/support/docview.wss?uid=swg21973086|http://www.securityfocus.com/bid/79545 | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | Other | Unknown | 84.5 | HIGH | ibm/tivoli_storage_flashcopy_manager_for_vmware | False | Unknown | nan |
CVE-2016-1629 | Google Chrome before 48.0.2564.116 allows remote attackers to bypass the Blink Same Origin Policy and a sandbox protection mechanism via unspecified vectors. | 2016-02-21 | 2026-05-06 | CWE-264 | google/chrome:*|novell/suse_package_hub_for_suse_linux_enterprise:12|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2|debian/debian_linux:8.0 | http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_18.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00045.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00047.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00048.html|http://rhn.redha... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2015-8803 | The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805. | 2016-02-23 | 2026-05-06 | CWE-254|CWE-310 | nettle_project/nettle:*|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2 | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176807.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177229.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177473.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html|htt... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | nettle_project/nettle | False | Unknown | nan |
CVE-2015-8804 | x86_64/ecc-384-modp.asm in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-384 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors. | 2016-02-23 | 2026-05-06 | CWE-254|CWE-310 | nettle_project/nettle:*|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2 | http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html|http://rhn.redhat.com/errata/RHSA-2016-2582.html|http://www.openwall.com/lists/oss-security/2016/02/02/2 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | nettle_project/nettle | False | Unknown | nan |
CVE-2015-8805 | The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803. | 2016-02-23 | 2026-05-06 | CWE-310 | nettle_project/nettle:*|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2 | http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html|http://rhn.redhat.com/errata/RHSA-2016-2582.html|http://www.openwall.com/lists/oss-security/2016/02/02/2 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | nettle_project/nettle | False | Unknown | nan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.