cve_id
stringlengths
13
16
description
stringlengths
34
2.67k
published_date
stringdate
1999-03-01 00:00:00
2018-08-06 00:00:00
last_modified
stringdate
2024-11-21 00:00:00
2026-05-06 00:00:00
cwe_ids
stringclasses
347 values
affected_products
stringlengths
7
639
reference_urls
stringlengths
49
643
exploit_available
stringclasses
2 values
cvss_score
stringclasses
35 values
cvss_severity
stringclasses
4 values
attack_vector
stringclasses
3 values
attack_complexity
stringclasses
2 values
privileges_required
stringclasses
3 values
user_interaction
stringclasses
2 values
scope
stringclasses
2 values
confidentiality_impact
stringclasses
3 values
integrity_impact
stringclasses
3 values
availability_impact
stringclasses
3 values
exploitability_score
stringclasses
12 values
impact_score
stringclasses
15 values
attack_type
stringclasses
33 values
likely_mitre_tactic
stringclasses
7 values
risk_score
stringclasses
58 values
risk_level
stringclasses
4 values
primary_vendor_product
stringlengths
5
107
in_cisa_kev
stringclasses
2 values
ransomware_use
stringclasses
2 values
kev_required_action
stringclasses
7 values
CVE-2015-2874
Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware before 3.4.1.105 have a default password of root for the root account, which allows remote attackers to obtain administrative access via a TELNET session.
2015-12-31
2026-05-06
CWE-255
seagate/wireless_mobile_storage:*|seagate/wireless_plus_mobile_storage:*|lacie/lac9000436u_firmware:*|lacie/lac9000464u_firmware:*|seagate/goflex_sattelite:*
https://www.kb.cert.org/vuls/id/903500|https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH|https://www.kb.cert.org/vuls/id/GWAN-A26L3F|https://www.kb.cert.org/vuls/id/903500|https://www.kb.cert.org/vuls/id/GWAN-9ZGTUH
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
seagate/wireless_mobile_storage
False
Unknown
nan
CVE-2015-5995
Mediabridge Medialink MWN-WAPR300N devices with firmware 5.07.50 and Tenda N3 Wireless N150 devices allow remote attackers to obtain administrative access via a certain admin substring in an HTTP Cookie header.
2015-12-31
2026-05-06
CWE-264
tenda/n3_wireless_n150:*|mediabridge/medialink_mwn-wapr300n_firmware:*
https://www.kb.cert.org/vuls/id/630872|https://www.kb.cert.org/vuls/id/630872
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
tenda/n3_wireless_n150
False
Unknown
nan
CVE-2015-6016
ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors.
2015-12-31
2026-05-06
CWE-255
zyxel/nbg-418n:-|zyxel/zynos_firmware:3.40\(axh.0\)|zyxel/pmg5318-b20a_firmware:v100aanc0b5
http://www.securitytracker.com/id/1034552|http://www.securitytracker.com/id/1034553|http://www.securitytracker.com/id/1034554|https://www.kb.cert.org/vuls/id/870744|https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
zyxel/nbg-418n
False
Unknown
nan
CVE-2015-6018
The diagnostic-ping implementation on ZyXEL PMG5318-B20A devices with firmware before 1.00(AANC.2)C0 allows remote attackers to execute arbitrary commands via the PingIPAddr parameter.
2015-12-31
2026-05-06
CWE-264
zyxel/pmg5318-b20a_firmware:*
http://www.securitytracker.com/id/1034553|https://www.exploit-db.com/exploits/38455/|https://www.kb.cert.org/vuls/id/870744|https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R|http://www.securitytracker.com/id/1034553
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
zyxel/pmg5318-b20a_firmware
False
Unknown
nan
CVE-2015-7277
The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
2015-12-31
2026-05-06
CWE-255
ampedwireless/r10000_firmware:2.5.2.11
http://www.securityfocus.com/bid/78818|https://www.kb.cert.org/vuls/id/763576|http://www.securityfocus.com/bid/78818|https://www.kb.cert.org/vuls/id/763576
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
ampedwireless/r10000_firmware
False
Unknown
nan
CVE-2015-7280
The web administration interface on ReadyNet WRT300N-DD devices with firmware 1.0.26 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
2015-12-31
2026-05-06
CWE-255
readynet_solutions/wrt300n-dd_firmware:1.0.26
http://www.securityfocus.com/bid/78814|https://www.kb.cert.org/vuls/id/167992|http://www.securityfocus.com/bid/78814|https://www.kb.cert.org/vuls/id/167992
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
readynet_solutions/wrt300n-dd_firmware
False
Unknown
nan
CVE-2015-5988
The web management interface on Belkin F9K1102 2 devices with firmware 2.10.17 has a blank password, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
2015-12-31
2026-05-06
CWE-255
zyxel/gs1900-10hp_firmware:*
https://www.kb.cert.org/vuls/id/201168|https://www.kb.cert.org/vuls/id/201168
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
zyxel/gs1900-10hp_firmware
False
Unknown
nan
CVE-2015-5989
Belkin F9K1102 2 devices with firmware 2.10.17 rely on client-side JavaScript code for authorization, which allows remote attackers to obtain administrative privileges via certain changes to LockStatus and Login_Success values.
2015-12-31
2026-05-06
CWE-264
zyxel/gs1900-10hp_firmware:*
https://www.kb.cert.org/vuls/id/201168|https://www.kb.cert.org/vuls/id/201168
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
zyxel/gs1900-10hp_firmware
False
Unknown
nan
CVE-2015-7426
The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.3.0 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 before 4.1.3.0 allows remote attackers...
2016-01-02
2026-05-06
CWE-78
ibm/spectrum_protect_for_virtual_environments:7.1|ibm/spectrum_protect_snapshot:4.1
http://www-01.ibm.com/support/docview.wss?uid=swg21971484|http://www-01.ibm.com/support/docview.wss?uid=swg21971484
False
10.0
CRITICAL
NETWORK
LOW
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
3.9
6.0
OS Command Injection
Execution
84.5
HIGH
ibm/spectrum_protect_for_virtual_environments
False
Unknown
nan
CVE-2015-7450
Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.
2016-01-02
2026-04-21
CWE-502|CWE-502
ibm/sterling_b2b_integrator:5.2|ibm/sterling_integrator:5.1|ibm/tivoli_common_reporting:2.1|ibm/tivoli_common_reporting:2.1.1|ibm/tivoli_common_reporting:2.1.1.2|ibm/tivoli_common_reporting:3.1|ibm/tivoli_common_reporting:3.1.0.1|ibm/tivoli_common_reporting:3.1.0.2|ibm/tivoli_common_reporting:3.1.2|ibm/tivoli_common_re...
http://www-01.ibm.com/support/docview.wss?uid=swg21970575|http://www-01.ibm.com/support/docview.wss?uid=swg21971342|http://www-01.ibm.com/support/docview.wss?uid=swg21971376|http://www-01.ibm.com/support/docview.wss?uid=swg21971733|http://www-01.ibm.com/support/docview.wss?uid=swg21971758
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Deserialization Vulnerability
Execution
100.0
CRITICAL
ibm/sterling_b2b_integrator
True
Unknown
Apply updates per vendor instructions.
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-b...
2016-01-03
2026-05-06
CWE-119
pcre/pcre:8.38|php/php:*|php/php:*|php/php:*|fedoraproject/fedora:22|fedoraproject/fedora:23|oracle/solaris:11.3
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html|http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html|http://www.securityfocus.com/bid/79825|http://www.securitytracker.com/id/103455...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
pcre/pcre
False
Unknown
nan
CVE-2015-6636
mediaserver in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 25070493 and 24686670.
2016-01-06
2026-05-06
CWE-119
google/android:5.0|google/android:5.1.1|google/android:6.0|google/android:6.0.1
http://source.android.com/security/bulletin/2016-01-01.html|http://www.securitytracker.com/id/1034592|http://source.android.com/security/bulletin/2016-01-01.html|http://www.securitytracker.com/id/1034592
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
83.5
HIGH
google/android
False
Unknown
nan
CVE-2015-6642
The kernel in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24157888.
2016-01-06
2026-05-06
CWE-264
google/android:5.1.0|google/android:6.0|google/android:6.0.1
http://source.android.com/security/bulletin/2016-01-01.html|http://www.securitytracker.com/id/1034592|http://source.android.com/security/bulletin/2016-01-01.html|http://www.securitytracker.com/id/1034592
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
google/android
False
Unknown
nan
CVE-2015-8261
The DroneDeleteOldMeasurements implementation in Ipswitch WhatsUp Gold before 16.4 does not properly validate serialized XML objects, which allows remote attackers to conduct SQL injection attacks via a crafted SOAP request.
2016-01-08
2026-05-06
CWE-89
progress/whatsup_gold:16.3
http://www.securitytracker.com/id/1034613|https://www.exploit-db.com/exploits/39231/|https://www.kb.cert.org/vuls/id/753264|http://www.securitytracker.com/id/1034613|https://www.exploit-db.com/exploits/39231/
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
SQL Injection
Initial Access
98.5
CRITICAL
progress/whatsup_gold
False
Unknown
nan
CVE-2015-5254
Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object.
2016-01-08
2026-05-06
CWE-20
redhat/openshift:2.0|apache/activemq:5.0.0|apache/activemq:5.1.0|apache/activemq:5.2.0|apache/activemq:5.3.0|apache/activemq:5.3.1|apache/activemq:5.3.2|apache/activemq:5.4.0|apache/activemq:5.4.1|apache/activemq:5.4.3
http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt|http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174371.html|http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174537.html|http://rhn.redhat.com/errata/RHSA-2016-0489.html|http://rhn.redhat.co...
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Improper Input Validation
Unknown
83.5
HIGH
redhat/openshift
False
Unknown
nan
CVE-2015-7554
The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.
2016-01-08
2026-05-06
CWE-254
libtiff/libtiff:4.0.6
http://lists.opensuse.org/opensuse-updates/2016-01/msg00078.html|http://lists.opensuse.org/opensuse-updates/2016-01/msg00081.html|http://lists.opensuse.org/opensuse-updates/2016-01/msg00100.html|http://packetstormsecurity.com/files/135078/libtiff-4.0.6-Invalid-Write.html|http://rhn.redhat.com/errata/RHSA-2016-1546.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
libtiff/libtiff
False
Unknown
nan
CVE-2015-8668
Heap-based buffer overflow in the PackBitsPreEncode function in tif_packbits.c in bmp2tiff in libtiff 4.0.6 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via a large width field in a BMP image.
2016-01-08
2026-05-06
CWE-787
libtiff/libtiff:*|oracle/vm_server:3.3|oracle/vm_server:3.4|oracle/linux:6|oracle/linux:7|redhat/enterprise_linux:6.0|redhat/enterprise_linux:7.0|redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_desktop:7.0|redhat/enterprise_linux_workstation:6.0
http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html|http://rhn.redhat.com/errata/RHSA-2016-1546.html|http://rhn.redhat.com/errata/RHSA-2016-1547.html|http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html|http://www.oracle.com/technetwork/topics/security/ovmbulletin...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Out-of-Bounds Write
Execution
98.5
CRITICAL
libtiff/libtiff
False
Unknown
nan
CVE-2015-8753
SAP Afaria 7.0.6001.5 allows remote attackers to bypass authorization checks and wipe or lock mobile devices via a crafted request, related to "Insecure signature," aka SAP Security Note 2134905.
2016-01-08
2026-05-06
CWE-264
sap/afaria:7.0.6001.5
https://erpscan.io/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/|https://erpscan.io/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/
False
9.1
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
HIGH
HIGH
3.9
5.2
Other
Unknown
80.0
HIGH
sap/afaria
False
Unknown
nan
CVE-2015-8761
The Values module 7.x-1.x before 7.x-1.2 for Drupal does not properly check permissions, which allows remote administrators with the "Import value sets" permission to execute arbitrary PHP code via the exported values list in a ctools import.
2016-01-08
2026-05-06
CWE-94
values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.0|values_project/values:7.x-1.1
http://cgit.drupalcode.org/values/commit/?id=5942ee9|http://www.securityfocus.com/bid/79656|https://www.drupal.org/node/2622534|https://www.drupal.org/node/2636344|http://cgit.drupalcode.org/values/commit/?id=5942ee9
False
9.0
CRITICAL
NETWORK
LOW
HIGH
NONE
CHANGED
LOW
HIGH
HIGH
2.3
6.0
Code Injection
Execution
71.5
HIGH
values_project/values
False
Unknown
nan
CVE-2015-8557
The FontManager._get_nix_font_path function in formatters/img.py in Pygments 1.2.2 through 2.0.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a font name.
2016-01-08
2026-05-06
CWE-78
canonical/ubuntu_linux:12.04|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.04|canonical/ubuntu_linux:15.10|pygments/pygments:1.2.2|pygments/pygments:1.3|pygments/pygments:1.3.1|pygments/pygments:1.4|pygments/pygments:1.5|pygments/pygments:1.6
http://packetstormsecurity.com/files/133823/Pygments-FontManager._get_nix_font_path-Shell-Injection.html|http://seclists.org/fulldisclosure/2015/Oct/4|http://www.debian.org/security/2016/dsa-3445|http://www.openwall.com/lists/oss-security/2015/12/14/17|http://www.openwall.com/lists/oss-security/2015/12/14/6
False
9.0
CRITICAL
NETWORK
HIGH
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
2.2
6.0
OS Command Injection
Execution
71.0
HIGH
canonical/ubuntu_linux
False
Unknown
nan
CVE-2015-7512
Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
2016-01-08
2026-05-06
CWE-120
qemu/qemu:*|qemu/qemu:2.5.0|qemu/qemu:2.5.0|qemu/qemu:2.5.0|redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_eus:6.7|redhat/enterprise_linux_server:6.0|redhat/enterprise_linux_workstation:6.0|redhat/openstack:5.0|redhat/virtualization:3.0
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f|http://rhn.redhat.com/errata/RHSA-2015-2694.html|http://rhn.redhat.com/errata/RHSA-2015-2695.html|http://rhn.redhat.com/errata/RHSA-2015-2696.html|http://www.debian.org/security/2016/dsa-3469
True
9.0
CRITICAL
NETWORK
HIGH
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
2.2
6.0
Buffer Overflow
Unknown
86.0
CRITICAL
qemu/qemu
False
Unknown
nan
CVE-2015-7541
The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable.
2016-01-08
2026-05-06
CWE-77
colorscore_project/colorscore:*
http://rubysec.com/advisories/CVE-2015-7541/|http://www.openwall.com/lists/oss-security/2016/01/05/2|https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718|http://rubysec.com/advisories/CVE-2015-7541/|http://www.openwall.com/lists/oss-security/2016/01/05/2
False
10.0
CRITICAL
NETWORK
LOW
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
3.9
6.0
Command Injection
Execution
84.5
HIGH
colorscore_project/colorscore
False
Unknown
nan
CVE-2015-7938
Advantech EKI-132x devices with firmware before 2015-12-31 allow remote attackers to bypass authentication via unspecified vectors.
2016-01-09
2026-05-06
CWE-287
advantech/eki-1321_series_firmware:*|advantech/eki-1322_series_firmware:*
https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01|https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Improper Authentication
Initial Access
83.5
HIGH
advantech/eki-1321_series_firmware
False
Unknown
nan
CVE-2015-7939
Heap-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.09 allows remote attackers to execute arbitrary code via a long vlp filename.
2016-01-09
2026-05-06
CWE-119
unitronics/visilogic_oplc_ide:*
http://www.zerodayinitiative.com/advisories/ZDI-16-001|https://ics-cert.us-cert.gov/advisories/ICSA-15-274-02A|http://www.zerodayinitiative.com/advisories/ZDI-16-001|https://ics-cert.us-cert.gov/advisories/ICSA-15-274-02A
False
9.6
CRITICAL
NETWORK
LOW
NONE
REQUIRED
CHANGED
HIGH
HIGH
HIGH
2.8
6.0
Buffer Overflow
Execution
77.0
HIGH
unitronics/visilogic_oplc_ide
False
Unknown
nan
CVE-2015-8098
F5 BIG-IP APM 11.4.1 before 11.4.1 HF9, 11.5.x before 11.5.3, and 11.6.0 before 11.6.0 HF4 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors related to processing a Citrix Remote Desktop connection through a virtual server configured with a remote desktop profile, aka...
2016-01-12
2026-05-06
CWE-119
f5/big-ip_access_policy_manager:11.2.0|f5/big-ip_access_policy_manager:11.2.1|f5/big-ip_access_policy_manager:11.3.0|f5/big-ip_access_policy_manager:11.4.0|f5/big-ip_access_policy_manager:11.5.0|f5/big-ip_access_policy_manager:11.5.1|f5/big-ip_access_policy_manager:11.6.0
http://www.securitytracker.com/id/1034609|https://support.f5.com/kb/en-us/solutions/public/k/43/sol43552605.html|http://www.securitytracker.com/id/1034609|https://support.f5.com/kb/en-us/solutions/public/k/43/sol43552605.html
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
83.5
HIGH
f5/big-ip_access_policy_manager
False
Unknown
nan
CVE-2015-8659
The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug.
2016-01-12
2026-05-06
CWE-119
apple/mac_os_x:*|nghttp2/nghttp2:*|apple/iphone_os:*|apple/tvos:*|apple/watchos:*
http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html|http://lists.fedoraproject.o...
False
10.0
CRITICAL
NETWORK
LOW
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
3.9
6.0
Buffer Overflow
Execution
84.5
HIGH
apple/mac_os_x
False
Unknown
nan
CVE-2015-8396
Integer overflow in the ImageRegionReader::ReadIntoBuffer function in MediaStorageAndFileFormat/gdcmImageRegionReader.cxx in Grassroots DICOM (aka GDCM) before 2.6.2 allows attackers to execute arbitrary code via crafted header dimensions in a DICOM image file, which triggers a buffer overflow.
2016-01-12
2026-05-06
CWE-189
malaterre/grassroots_dicom:*|malaterre/grassroots_dicom:2.6.1
http://census-labs.com/news/2016/01/11/gdcm-buffer-overflow-imageregionreaderreadintobuffer/|http://packetstormsecurity.com/files/135205/GDCM-2.6.0-2.6.1-Integer-Overflow.html|http://seclists.org/fulldisclosure/2016/Jan/29|http://sourceforge.net/p/gdcm/gdcm/ci/e547b1ded3fd21e0b0ad149f13045aa12d4b9b7c/|http://sourceforg...
True
10.0
CRITICAL
NETWORK
LOW
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
3.9
6.0
Other
Unknown
99.5
CRITICAL
malaterre/grassroots_dicom
False
Unknown
nan
CVE-2015-8611
BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, and PEM 12.0.0 before HF1 on the 2000, 4000, 5000, 7000, and 10000 platforms do not properly sync passwords with the Always-On Management (AOM) subsystem, which might allow remote attackers to obtain login access to AOM via an (1) expired or (2) default p...
2016-01-12
2026-05-06
CWE-255
f5/big-ip_domain_name_system:12.0.0|f5/big-ip_application_acceleration_manager:12.0.0|f5/big-ip_link_controller:12.0.0|f5/big-ip_policy_enforcement_manager:12.0.0|f5/big-ip_advanced_firewall_manager:12.0.0|f5/big-ip_local_traffic_manager:12.0.0|f5/big-ip_access_policy_manager:12.0.0|f5/big-ip_application_security_manag...
http://www.securitytracker.com/id/1034629|https://support.f5.com/kb/en-us/solutions/public/k/05/sol05272632.html|http://www.securitytracker.com/id/1034629|https://support.f5.com/kb/en-us/solutions/public/k/05/sol05272632.html
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
f5/big-ip_domain_name_system
False
Unknown
nan
CVE-2016-0003
Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka "Microsoft Edge Memory Corruption Vulnerability."
2016-01-13
2026-05-06
CWE-119
microsoft/edge:-
http://www.securitytracker.com/id/1034649|http://www.zerodayinitiative.com/advisories/ZDI-16-019|https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-002|http://www.securitytracker.com/id/1034649|http://www.zerodayinitiative.com/advisories/ZDI-16-019
False
9.6
CRITICAL
NETWORK
LOW
NONE
REQUIRED
CHANGED
HIGH
HIGH
HIGH
2.8
6.0
Buffer Overflow
Execution
77.0
HIGH
microsoft/edge
False
Unknown
nan
CVE-2016-0933
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera...
2016-01-14
2026-05-06
CWE-119
adobe/acrobat_reader:*|adobe/acrobat_reader:11.0.0|adobe/acrobat_reader:11.0.1|adobe/acrobat_reader:11.0.2|adobe/acrobat_reader:11.0.3|adobe/acrobat_reader:11.0.4|adobe/acrobat_reader:11.0.5|adobe/acrobat_reader:11.0.6|adobe/acrobat_reader:11.0.7|adobe/acrobat_reader:11.0.8
http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1217|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
adobe/acrobat_reader
False
Unknown
nan
CVE-2016-0940
Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-...
2016-01-14
2026-05-06
UNKNOWN
adobe/acrobat:*|adobe/acrobat:11.0.0|adobe/acrobat:11.0.1|adobe/acrobat:11.0.2|adobe/acrobat:11.0.3|adobe/acrobat:11.0.4|adobe/acrobat:11.0.5|adobe/acrobat:11.0.6|adobe/acrobat:11.0.7|adobe/acrobat:11.0.8
http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Unknown
Unknown
98.5
CRITICAL
adobe/acrobat
False
Unknown
nan
CVE-2016-0942
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera...
2016-01-14
2026-05-06
CWE-119
adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat:*|adobe/acrobat:11.0.0|adobe/acrobat:11.0.1|adobe/acrobat:11.0.2|adobe/acrobat:11.0.3|adobe/acrobat:11.0.4
http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
adobe/acrobat_dc
False
Unknown
nan
CVE-2016-0944
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera...
2016-01-14
2026-05-06
CWE-119
adobe/acrobat_reader:*|adobe/acrobat_reader:11.0.0|adobe/acrobat_reader:11.0.1|adobe/acrobat_reader:11.0.2|adobe/acrobat_reader:11.0.3|adobe/acrobat_reader:11.0.4|adobe/acrobat_reader:11.0.5|adobe/acrobat_reader:11.0.6|adobe/acrobat_reader:11.0.7|adobe/acrobat_reader:11.0.8
http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
adobe/acrobat_reader
False
Unknown
nan
CVE-2016-0945
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera...
2016-01-14
2026-05-06
CWE-119
adobe/acrobat_reader:*|adobe/acrobat_reader:11.0.0|adobe/acrobat_reader:11.0.1|adobe/acrobat_reader:11.0.2|adobe/acrobat_reader:11.0.3|adobe/acrobat_reader:11.0.4|adobe/acrobat_reader:11.0.5|adobe/acrobat_reader:11.0.6|adobe/acrobat_reader:11.0.7|adobe/acrobat_reader:11.0.8
http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
adobe/acrobat_reader
False
Unknown
nan
CVE-2016-0946
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera...
2016-01-14
2026-05-06
CWE-119
adobe/acrobat_reader:*|adobe/acrobat_reader:11.0.0|adobe/acrobat_reader:11.0.1|adobe/acrobat_reader:11.0.2|adobe/acrobat_reader:11.0.3|adobe/acrobat_reader:11.0.4|adobe/acrobat_reader:11.0.5|adobe/acrobat_reader:11.0.6|adobe/acrobat_reader:11.0.7|adobe/acrobat_reader:11.0.8
http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html|http://www.securitytracker.com/id/1034646|https://helpx.adobe.com/security/products/acrobat/apsb16-02.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
adobe/acrobat_reader
False
Unknown
nan
CVE-2015-6314
Cisco Wireless LAN Controller (WLC) devices with software 7.6.x, 8.0 before 8.0.121.0, and 8.1 before 8.1.131.0 allow remote attackers to change configuration settings via unspecified vectors, aka Bug ID CSCuw06153.
2016-01-15
2026-05-06
CWE-287
cisco/wireless_lan_controller_software:8.0.72.140|cisco/wireless_lan_controller_software:8.0_base|cisco/wireless_lan_controller_software:8.1.0|cisco/wireless_lan_controller_software:8.1.104.37|cisco/wireless_lan_controller_software:8.1.111.0|cisco/wireless_lan_controller_software:8.1.122.0
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-wlc|http://www.securitytracker.com/id/1034665|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-wlc|http://www.securitytracker.com/id/1034665
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Improper Authentication
Initial Access
83.5
HIGH
cisco/wireless_lan_controller_software
False
Unknown
nan
CVE-2015-6323
The Admin portal in Cisco Identity Services Engine (ISE) 1.1.x, 1.2.0 before patch 17, 1.2.1 before patch 8, 1.3 before patch 5, and 1.4 before patch 4 allows remote attackers to obtain administrative access via unspecified vectors, aka Bug ID CSCuw34253.
2016-01-15
2026-05-06
UNKNOWN
cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1.1|cisco/identity_services_engine_software:1.1....
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-ise|http://www.securitytracker.com/id/1034666|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-ise|http://www.securitytracker.com/id/1034666
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Unknown
Unknown
83.5
HIGH
cisco/identity_services_engine_software
False
Unknown
nan
CVE-2016-0854
Unrestricted file upload vulnerability in the uploadImageCommon function in the UploadAjaxAction script in the WebAccess Dashboard Viewer in Advantech WebAccess before 8.1 allows remote attackers to write to files of arbitrary types via unspecified vectors.
2016-01-15
2026-05-06
UNKNOWN
advantech/webaccess:*
http://www.rapid7.com/db/modules/exploit/windows/scada/advantech_webaccess_dashboard_file_upload|http://www.zerodayinitiative.com/advisories/ZDI-16-127|http://www.zerodayinitiative.com/advisories/ZDI-16-128|http://www.zerodayinitiative.com/advisories/ZDI-16-129|https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Unknown
Unknown
98.5
CRITICAL
advantech/webaccess
False
Unknown
nan
CVE-2016-0856
Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to execute arbitrary code via unspecified vectors.
2016-01-15
2026-05-06
CWE-119
advantech/webaccess:*
http://www.zerodayinitiative.com/advisories/ZDI-16-100|http://www.zerodayinitiative.com/advisories/ZDI-16-101|http://www.zerodayinitiative.com/advisories/ZDI-16-102|http://www.zerodayinitiative.com/advisories/ZDI-16-103|http://www.zerodayinitiative.com/advisories/ZDI-16-106
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
advantech/webaccess
False
Unknown
nan
CVE-2016-0857
Multiple heap-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to execute arbitrary code via unspecified vectors.
2016-01-15
2026-05-06
CWE-119
advantech/webaccess:*
http://www.zerodayinitiative.com/advisories/ZDI-16-107|http://www.zerodayinitiative.com/advisories/ZDI-16-119|http://www.zerodayinitiative.com/advisories/ZDI-16-121|https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01|http://www.zerodayinitiative.com/advisories/ZDI-16-107
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
advantech/webaccess
False
Unknown
nan
CVE-2016-0859
Integer overflow in the Kernel service in Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted RPC request.
2016-01-15
2026-05-06
CWE-189
advantech/webaccess:*
http://www.zerodayinitiative.com/advisories/ZDI-16-104|https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01|http://www.zerodayinitiative.com/advisories/ZDI-16-104|https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
advantech/webaccess
False
Unknown
nan
CVE-2016-1909
Fortinet FortiAnalyzer before 5.0.12 and 5.2.x before 5.2.5; FortiSwitch 3.3.x before 3.3.3; FortiCache 3.0.x before 3.0.8; and FortiOS 4.1.x before 4.1.11, 4.2.x before 4.2.16, 4.3.x before 4.3.17 and 5.0.x before 5.0.8 have a hardcoded passphrase for the Fortimanager_Access account, which allows remote attackers to o...
2016-01-15
2026-05-06
CWE-264
fortinet/fortios:*|fortinet/fortios:5.0|fortinet/fortios:5.0.0|fortinet/fortios:5.0.1|fortinet/fortios:5.0.2|fortinet/fortios:5.0.3|fortinet/fortios:5.0.4|fortinet/fortios:5.0.5|fortinet/fortios:5.0.6|fortinet/fortios:5.0.7
http://blog.fortinet.com/post/brief-statement-regarding-issues-found-with-fortios|http://packetstormsecurity.com/files/135225/FortiGate-OS-5.0.7-SSH-Backdoor.html|http://seclists.org/fulldisclosure/2016/Jan/26|http://www.fortiguard.com/advisory/multiple-products-ssh-undocumented-login-vulnerability|http://www.securityt...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
fortinet/fortios
False
Unknown
nan
CVE-2016-1142
Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors.
2016-01-16
2026-05-06
CWE-78
seeds/acmailer:*|seeds/acmailer:3.9.0|seeds/acmailer:3.9.1|seeds/acmailer:3.9.2|seeds/acmailer:3.9.3|seeds/acmailer:3.9.4|seeds/acmailer:3.9.5|seeds/acmailer:3.9.6|seeds/acmailer:3.9.7|seeds/acmailer:3.9.8
http://jvn.jp/en/jp/JVN50899877/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002|http://www.acmailer.jp/info/de.cgi?id=64|http://jvn.jp/en/jp/JVN50899877/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002
False
9.1
CRITICAL
NETWORK
LOW
HIGH
NONE
CHANGED
HIGH
HIGH
HIGH
2.3
6.0
OS Command Injection
Execution
72.0
HIGH
seeds/acmailer
False
Unknown
nan
CVE-2015-8617
Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.
2016-01-19
2026-05-06
CWE-134
php/php:7.0.1
http://php.net/ChangeLog-7.php|http://www.securitytracker.com/id/1034543|https://bugs.php.net/bug.php?id=71105|https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e|http://php.net/ChangeLog-7.php
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
php/php
False
Unknown
nan
CVE-2016-1903
The gdImageRotateInterpolated function in ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a large bgd_color argument to the imagerotate func...
2016-01-19
2026-05-06
CWE-119|CWE-200
php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0
http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html|http://rhn.redhat.com/errata/RHSA-2016-2750.html|http://www.openwall.com/lists/oss-security/2016/01/14/8|http://www.php.net/ChangeLog-5.php
True
9.1
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
NONE
HIGH
3.9
5.2
Buffer Overflow
Execution
95.0
CRITICAL
php/php
False
Unknown
nan
CVE-2016-1901
Integer overflow in the authenticate_post function in CGit before 0.12 allows remote attackers to have unspecified impact via a large value in the Content-Length HTTP header, which triggers a buffer overflow.
2016-01-20
2026-05-06
CWE-119
fedoraproject/fedora:22|cgit_project/cgit:*
http://git.zx2c4.com/cgit/commit/?id=4458abf64172a62b92810c2293450106e6dfc763|http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176167.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176198.html|http://lists.opensuse.org/opensuse-updates/2016-01/msg00067.html|http://list...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
fedoraproject/fedora
False
Unknown
nan
CVE-2016-1928
Buffer overflow in the XS engine (hdbxsengine) in SAP HANA allows remote attackers to cause a denial of service or execute arbitrary code via a crafted HTTP request, related to JSON, aka SAP Security Note 2241978.
2016-01-20
2026-05-06
CWE-119
sap/hana:-
http://seclists.org/fulldisclosure/2016/Apr/65|http://www.securityfocus.com/archive/1/538212/100/0/threaded|https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/|https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/|http://seclists.org/fulldisclosure/2016/Apr/65
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
83.5
HIGH
sap/hana
False
Unknown
nan
CVE-2016-1929
The XS engine in SAP HANA allows remote attackers to spoof log entries in trace files and consequently cause a denial of service (disk consumption and process crash) via a crafted HTTP request, related to an unspecified debug function, aka SAP Security Note 2241978.
2016-01-20
2026-05-06
CWE-20
sap/hana:-
http://seclists.org/fulldisclosure/2016/Apr/59|https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/|https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/|http://seclists.org/fulldisclosure/2016/Apr/59|https://erpscan.io/advisories/erpscan-16-002-sap-hana-lo...
False
9.3
CRITICAL
NETWORK
LOW
NONE
NONE
CHANGED
NONE
LOW
HIGH
3.9
4.7
Improper Input Validation
Unknown
81.0
HIGH
sap/hana
False
Unknown
nan
CVE-2015-6412
Cisco Modular Encoding Platform D9036 Software before 02.04.70 has hardcoded (1) root and (2) guest passwords, which makes it easier for remote attackers to obtain access via an SSH session, aka Bug ID CSCut88070.
2016-01-22
2026-05-06
CWE-255
cisco/modular_encoding_platform_d9036_software:02.00.80|cisco/modular_encoding_platform_d9036_software:02.01.50|cisco/modular_encoding_platform_d9036_software:02.02.30|cisco/modular_encoding_platform_d9036_software:02.03.30
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-d9036|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-d9036
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
cisco/modular_encoding_platform_d9036_software
False
Unknown
nan
CVE-2015-6435
An unspecified CGI script in Cisco FX-OS before 1.1.2 on Firepower 9000 devices and Cisco Unified Computing System (UCS) Manager before 2.2(4b), 2.2(5) before 2.2(5a), and 3.0 before 3.0(2e) allows remote attackers to execute arbitrary shell commands via a crafted HTTP request, aka Bug ID CSCur90888.
2016-01-22
2026-05-06
CWE-78
cisco/firepower_extensible_operating_system:1.1\(1.86\)|cisco/firepower_extensible_operating_system:1.1\(1.160\)|cisco/firepower_extensible_operating_system:1.1.1|cisco/unified_computing_system:1.0\(2k\)|cisco/unified_computing_system:1.0_base|cisco/unified_computing_system:1.1\(1m\)|cisco/unified_computing_system:1.1_...
http://packetstormsecurity.com/files/160991/Cisco-UCS-Manager-2.2-1d-Remote-Command-Execution.html|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-ucsm|http://www.securitytracker.com/id/1034743|http://packetstormsecurity.com/files/160991/Cisco-UCS-Manager-2.2-1d-Remote-Command-Exe...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
OS Command Injection
Execution
98.5
CRITICAL
cisco/firepower_extensible_operating_system
False
Unknown
nan
CVE-2015-8362
The setUpSubtleUserAccount function in /bin/bw on Harman AMX devices before 2015-10-12 has a hardcoded password for the BlackWidow account, which makes it easier for remote attackers to obtain access via a (1) SSH or (2) HTTP session, a different vulnerability than CVE-2016-1984.
2016-01-22
2026-05-06
CWE-255
harman/amx_firmware:1.2.322|harman/amx_firmware:1.3.100
http://blog.sec-consult.com/2016/01/deliberately-hidden-backdoor-account-in.html|http://seclists.org/fulldisclosure/2016/Jan/63|http://www.amx.com/techcenter/NXSecurityBrief/|http://www.amx.com/techcenter/firmware.asp?Category=Hot%20Fix%20Files|http://www.securityfocus.com/archive/1/537343/100/0/threaded
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
harman/amx_firmware
False
Unknown
nan
CVE-2016-1984
The setUpSubtleUserAccount function in /bin/bw on Harman AMX devices before 2016-01-20 has a hardcoded password for the 1MB@tMaN account, which makes it easier for remote attackers to obtain access via a (1) SSH or (2) HTTP session, a different vulnerability than CVE-2015-8362.
2016-01-22
2026-05-06
CWE-255
harman/amx_firmware:1.2.322|harman/amx_firmware:1.3.100
http://blog.sec-consult.com/2016/01/deliberately-hidden-backdoor-account-in.html|http://seclists.org/fulldisclosure/2016/Jan/63|http://www.amx.com/techcenter/NXSecurityBrief/|http://www.amx.com/techcenter/firmware.asp?Category=Hot%20Fix%20Files|https://ics-cert.us-cert.gov/advisories/ICSA-16-049-02
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
harman/amx_firmware
False
Unknown
nan
CVE-2016-2051
Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
2016-01-25
2026-05-06
UNKNOWN
google/chrome:*|redhat/enterprise_linux_desktop_supplementary:6.0|redhat/enterprise_linux_server_supplementary:6.0|redhat/enterprise_linux_server_supplementary_eus:6.7.z|redhat/enterprise_linux_workstation_supplementary:6.0
http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html|http://rhn.redhat.com/errata/RHSA-2016-0072.html|http://www.securityfocus.com/bid/81431|http://www.securitytracker.com/id/1034801|http://www.ubuntu.com/usn/USN-2877-1
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Unknown
Unknown
83.5
HIGH
google/chrome
False
Unknown
nan
CVE-2016-1896
Race condition in the initialization process on Lexmark printers with firmware ATL before ATL.02.049, CB before CB.02.049, PP before PP.02.049, and YK before YK.02.049 allows remote attackers to bypass authentication by leveraging incorrect detection of the security-jumper status.
2016-01-27
2026-05-06
CWE-254|CWE-264
lexmark/printer_firmware:*|lexmark/printer_firmware:*|lexmark/printer_firmware:*|lexmark/printer_firmware:*
http://support.lexmark.com/index?page=content&id=TE745|http://support.lexmark.com/index?page=content&id=TE745
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
lexmark/printer_firmware
False
Unknown
nan
CVE-2015-6319
SQL injection vulnerability in the web-based management interface on Cisco RV220W devices allows remote attackers to execute arbitrary SQL commands via a crafted header in an HTTP request, aka Bug ID CSCuv29574.
2016-01-27
2026-05-06
CWE-89
cisco/rv_series_router_firmware:1.0.0.2|cisco/rv_series_router_firmware:1.0.0.30|cisco/rv_series_router_firmware:1.0.1.9|cisco/rv_series_router_firmware:1.0.2.6|cisco/rv_series_router_firmware:1.0.3.10|cisco/rv_series_router_firmware:1.0.4.10|cisco/rv_series_router_firmware:1.0.4.14|cisco/rv_series_router_firmware:1.0....
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220|http://www.securitytracker.com/id/1034830|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220|http://www.securitytracker.com/id/1034830
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
SQL Injection
Initial Access
83.5
HIGH
cisco/rv_series_router_firmware
False
Unknown
nan
CVE-2016-0868
Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 15.000 and B before 15.002 allows remote attackers to execute arbitrary code via a crafted web request.
2016-01-28
2026-05-06
CWE-119
rockwellautomation/1763-l16awa_series_a:15.000|rockwellautomation/1763-l16awa_series_b:15.000|rockwellautomation/1763-l16bbb_series_a:15.000|rockwellautomation/1763-l16bbb_series_b:15.000|rockwellautomation/1763-l16bwa_series_a:15.000|rockwellautomation/1763-l16bwa_series_b:15.000|rockwellautomation/1763-l16dwd_series_...
http://www.securitytracker.com/id/1034861|https://ics-cert.us-cert.gov/advisories/ICSA-16-026-02|http://www.securitytracker.com/id/1034861|https://ics-cert.us-cert.gov/advisories/ICSA-16-026-02
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
rockwellautomation/1763-l16awa_series_a
False
Unknown
nan
CVE-2015-8789
Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.
2016-01-29
2026-05-06
UNKNOWN
matroska/libebml:*
http://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html|http://lists.opensuse.org/opensuse-updates/2016-01/msg00035.html|http://www.debian.org/security/2016/dsa-3538|http://www.securityfocus.com/bid/94924|http://www.talosintelligence.com/reports/TALOS-2016-0037/
False
9.6
CRITICAL
NETWORK
LOW
NONE
REQUIRED
CHANGED
HIGH
HIGH
HIGH
2.8
6.0
Unknown
Unknown
77.0
HIGH
matroska/libebml
False
Unknown
nan
CVE-2015-8772
McPvDrv.sys 4.6.111.0 in McAfee File Lock 5.x in McAfee Total Protection allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a large VERIFY_INFORMATION.Length value in an IOCTL_DISK_VERIFY ioctl call.
2016-01-29
2026-05-06
CWE-19
mcafee/file_lock:5.0
http://seclists.org/fulldisclosure/2016/Jan/90|https://www.nettitude.co.uk/mcafee-file-lock-driver-kernel-memory-leak/|http://seclists.org/fulldisclosure/2016/Jan/90|https://www.nettitude.co.uk/mcafee-file-lock-driver-kernel-memory-leak/
False
9.1
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
NONE
HIGH
3.9
5.2
Other
Unknown
80.0
HIGH
mcafee/file_lock
False
Unknown
nan
CVE-2015-7923
Westermo WeOS before 4.19.0 uses the same SSL private key across different customers' installations, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a key.
2016-01-30
2026-05-06
CWE-310
westermo/weos:4.18.0
https://ics-cert.us-cert.gov/advisories/ICSA-16-028-01|https://ics-cert.us-cert.gov/advisories/ICSA-16-028-01
True
9.0
CRITICAL
NETWORK
HIGH
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
2.2
6.0
Other
Unknown
86.0
CRITICAL
westermo/weos
False
Unknown
nan
CVE-2016-1985
HPE Operations Manager 8.x and 9.0 on Windows allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library.
2016-01-30
2026-05-06
CWE-94
hp/operations_manager:8.1|hp/operations_manager:8.10|hp/operations_manager:8.16|hp/operations_manager:9.0
http://www.securityfocus.com/bid/82259|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953244|http://www.securityfocus.com/bid/82259|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953244
False
10.0
CRITICAL
NETWORK
LOW
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
3.9
6.0
Code Injection
Execution
84.5
HIGH
hp/operations_manager
False
Unknown
nan
CVE-2016-1930
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
2016-01-31
2026-05-06
CWE-119
mozilla/firefox:*|oracle/linux:5.0|oracle/linux:6|oracle/linux:7|mozilla/firefox:38.0|mozilla/firefox:38.1.0|mozilla/firefox:38.2.0|mozilla/firefox:38.3.0|mozilla/firefox:38.4.0|mozilla/firefox:38.5.0
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html|http://lists.opensus...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
mozilla/firefox
False
Unknown
nan
CVE-2016-1931
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vec...
2016-01-31
2026-05-06
CWE-119
mozilla/firefox:*|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html|http://www.mozilla.org/security/announce/2016/mfsa2016-01.html|http://www.securityfocus.com/bid/81953|http://www.securitytracker.com/id/1034825
False
10.0
CRITICAL
NETWORK
LOW
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
3.9
6.0
Buffer Overflow
Execution
84.5
HIGH
mozilla/firefox
False
Unknown
nan
CVE-2016-1944
The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
2016-01-31
2026-05-06
CWE-119
mozilla/firefox:43.0.4|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html|http://www.mozilla.org/security/announce/2016/mfsa2016-10.html|http://www.securityfocus.com/bid/81950|http://www.securitytracker.com/id/1034825
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
83.5
HIGH
mozilla/firefox
False
Unknown
nan
CVE-2016-1946
The MoofParser::Metadata function in binding/MoofParser.cpp in libstagefright in Mozilla Firefox before 44.0 does not limit the size of read operations, which might allow remote attackers to cause a denial of service (integer overflow and buffer overflow) or possibly have unspecified other impact via crafted metadata.
2016-01-31
2026-05-06
CWE-119|CWE-189
opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2|mozilla/firefox:*
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html|http://www.mozilla.org/security/announce/2016/mfsa2016-10.html|http://www.securityfocus.com/bid/81950|http://www.securitytracker.com/id/1034825
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
83.5
HIGH
opensuse/leap
False
Unknown
nan
CVE-2015-5344
The camel-xstream component in Apache Camel before 2.15.5 and 2.16.x before 2.16.1 allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
2016-02-03
2026-05-06
CWE-19
apache/camel:*|apache/camel:2.16.0
http://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc|http://rhn.redhat.com/errata/RHSA-2016-2035.html|http://www.securityfocus.com/archive/1/537414/100/0/threaded|http://www.securityfocus.com/bid/82260|https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Cc...
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
apache/camel
False
Unknown
nan
CVE-2015-8747
The multifilesystem storage backend in Radicale before 1.1 allows remote attackers to read or write to arbitrary files via a crafted component name.
2016-02-03
2026-05-06
CWE-20
radicale/radicale:*
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175738.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175776.html|http://www.debian.org/security/2016/dsa-3462|http://www.openwall.com/lists/oss-security/2016/01/05/7|http://www.openwall.com/lists/oss-security/2016/01/06...
False
10.0
CRITICAL
NETWORK
LOW
NONE
NONE
CHANGED
HIGH
HIGH
NONE
3.9
5.8
Improper Input Validation
Unknown
84.5
HIGH
radicale/radicale
False
Unknown
nan
CVE-2016-1505
The filesystem storage backend in Radicale before 1.1 on Windows allows remote attackers to read or write to arbitrary files via a crafted path, as demonstrated by /c:/file/ignore.
2016-02-03
2026-05-06
CWE-21
radicale/radicale:*
http://www.openwall.com/lists/oss-security/2016/01/05/7|http://www.openwall.com/lists/oss-security/2016/01/06/4|http://www.openwall.com/lists/oss-security/2016/01/06/7|http://www.openwall.com/lists/oss-security/2016/01/07/7|http://www.securityfocus.com/bid/80255
False
10.0
CRITICAL
NETWORK
LOW
NONE
NONE
CHANGED
HIGH
HIGH
NONE
3.9
5.8
Other
Unknown
84.5
HIGH
radicale/radicale
False
Unknown
nan
CVE-2016-1906
Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed.
2016-02-03
2026-05-06
CWE-264
kubernetes/kubernetes:-
https://access.redhat.com/errata/RHSA-2016:0070|https://access.redhat.com/errata/RHSA-2016:0351|https://github.com/openshift/origin/issues/6556|https://github.com/openshift/origin/pull/6576|https://access.redhat.com/errata/RHSA-2016:0070
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
kubernetes/kubernetes
False
Unknown
nan
CVE-2015-7915
Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 sends cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network.
2016-02-06
2026-05-06
CWE-200|CWE-255
sauter/moduweb_vision:*
http://seclists.org/fulldisclosure/2016/Feb/25|https://ics-cert.us-cert.gov/advisories/ICSA-16-033-01|http://seclists.org/fulldisclosure/2016/Feb/25|https://ics-cert.us-cert.gov/advisories/ICSA-16-033-01
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Information Disclosure
Collection
98.5
CRITICAL
sauter/moduweb_vision
False
Unknown
nan
CVE-2016-0801
The Broadcom Wi-Fi driver in the kernel in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49G, and 6.x before 2016-02-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted wireless control message packets, aka internal bug 25662029.
2016-02-07
2026-05-06
CWE-20
apple/iphone_os:*|apple/mac_os_x:*|apple/tvos:*|apple/watchos:*|google/android:4.4.4|google/android:5.0|google/android:5.1.1|google/android:6.0|google/android:6.0.1
http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html|http://source.android.com/se...
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Improper Input Validation
Unknown
83.5
HIGH
apple/iphone_os
False
Unknown
nan
CVE-2016-0803
libstagefright in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49G, and 6.x before 2016-02-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file that triggers a large memory allocation in the (1) SoftMPEG4Encoder or (2) SoftVPXEnco...
2016-02-07
2026-05-06
CWE-119
google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2
http://source.android.com/security/bulletin/2016-02-01.html|https://android.googlesource.com/platform%2Fframeworks%2Fav/+/50270d98e26fa18b20ca88216c3526667b724ba7|http://source.android.com/security/bulletin/2016-02-01.html|https://android.googlesource.com/platform%2Fframeworks%2Fav/+/50270d98e26fa18b20ca88216c3526667b7...
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
83.5
HIGH
google/android
False
Unknown
nan
CVE-2016-0804
The NuPlayer::GenericSource::notifyPreparedAndCleanup function in media/libmediaplayerservice/nuplayer/GenericSource.cpp in mediaserver in Android 5.x before 5.1.1 LMY49G and 6.x before 2016-02-01 improperly manages mDrmManagerClient objects, which allows remote attackers to execute arbitrary code or cause a denial of ...
2016-02-07
2026-05-06
CWE-119
google/android:5.0|google/android:5.0.1|google/android:5.0.2|google/android:5.1|google/android:5.1.0|google/android:5.1.1|google/android:6.0|google/android:6.0.1
http://source.android.com/security/bulletin/2016-02-01.html|https://android.googlesource.com/platform%2Fframeworks%2Fav/+/224858e719d045c8554856b12c4ab73d2375cf33|http://source.android.com/security/bulletin/2016-02-01.html|https://android.googlesource.com/platform%2Fframeworks%2Fav/+/224858e719d045c8554856b12c4ab73d237...
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
83.5
HIGH
google/android
False
Unknown
nan
CVE-2015-8787
The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a relate...
2016-02-08
2026-05-06
CWE-476
linux/linux_kernel:*|linux/linux_kernel:*
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f9cd81436c85d8c3a318ba92e236ede73752fc|http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html|http://lists.opensuse.org/opensuse-se...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
NULL Pointer Dereference
Unknown
98.5
CRITICAL
linux/linux_kernel
False
Unknown
nan
CVE-2016-2230
OpenELEC and RasPlex devices have a hardcoded password for the root account, which makes it easier for remote attackers to obtain access via an SSH session.
2016-02-08
2026-05-06
CWE-255
openelec/openelec:*
http://www.kb.cert.org/vuls/id/544527|https://github.com/RasPlex/RasPlex/issues/453|http://www.kb.cert.org/vuls/id/544527|https://github.com/RasPlex/RasPlex/issues/453
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
openelec/openelec
False
Unknown
nan
CVE-2014-9757
The Ignite Realtime Smack XMPP API, as used in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0, allows remote configured XMPP servers to execute arbitrary Java code via serialized data in an XMPP message.
2016-02-08
2026-05-06
CWE-20
atlassian/bamboo:2.4|atlassian/bamboo:2.4.1|atlassian/bamboo:2.4.2|atlassian/bamboo:2.4.3|atlassian/bamboo:2.5|atlassian/bamboo:2.5.1|atlassian/bamboo:2.5.2|atlassian/bamboo:2.5.3|atlassian/bamboo:2.5.5|atlassian/bamboo:2.6
http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html|http://www.securityfocus.com/archive/1/537347/100/0/threaded|https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html|https://jira.atlassian.com/browse/BAM-17099|http://packetstormsecu...
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Improper Input Validation
Unknown
83.5
HIGH
atlassian/bamboo
False
Unknown
nan
CVE-2015-3252
Apache CloudStack before 4.5.2 does not properly preserve VNC passwords when migrating KVM virtual machines, which allows remote attackers to gain access by connecting to the VNC server.
2016-02-08
2026-05-06
CWE-255
apache/cloudstack:*
http://mail-archives.apache.org/mod_mbox/cloudstack-users/201602.mbox/%3C7508580E-3D83-49FD-BE6E-B329B0503130%40gmail.com%3E|http://www.securityfocus.com/archive/1/537459/100/0/threaded|https://blogs.apache.org/cloudstack/entry/two_late_announced_security_advisories|http://mail-archives.apache.org/mod_mbox/cloudstack-u...
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
apache/cloudstack
False
Unknown
nan
CVE-2015-8360
An unspecified resource in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 allows remote attackers to execute arbitrary Java code via serialized data to the JMS port.
2016-02-08
2026-05-06
CWE-20
atlassian/bamboo:2.3.1|atlassian/bamboo:2.4|atlassian/bamboo:2.4.1|atlassian/bamboo:2.4.2|atlassian/bamboo:2.4.3|atlassian/bamboo:2.5|atlassian/bamboo:2.5.1|atlassian/bamboo:2.5.2|atlassian/bamboo:2.5.3|atlassian/bamboo:2.5.5
http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html|http://www.securityfocus.com/archive/1/537347/100/0/threaded|https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html|https://jira.atlassian.com/browse/BAM-17101|http://packetstormsecu...
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Improper Input Validation
Unknown
83.5
HIGH
atlassian/bamboo
False
Unknown
nan
CVE-2015-8361
Multiple unspecified services in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 do not require authentication, which allows remote attackers to obtain sensitive information, modify settings, or manage build agents via unknown vectors involving the JMS port.
2016-02-08
2026-05-06
CWE-284
atlassian/bamboo:2.4|atlassian/bamboo:2.4.1|atlassian/bamboo:2.4.2|atlassian/bamboo:2.4.3|atlassian/bamboo:2.5|atlassian/bamboo:2.5.1|atlassian/bamboo:2.5.2|atlassian/bamboo:2.5.3|atlassian/bamboo:2.5.5|atlassian/bamboo:2.6
http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html|http://www.securityfocus.com/archive/1/537347/100/0/threaded|https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html|https://jira.atlassian.com/browse/BAM-17102|http://packetstormsecu...
False
9.1
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
NONE
3.9
5.2
Other
Unknown
80.0
HIGH
atlassian/bamboo
False
Unknown
nan
CVE-2016-0949
Adobe Connect before 9.5.2 allows remote attackers to have an unspecified impact via a crafted parameter in a URL.
2016-02-10
2026-05-06
UNKNOWN
adobe/connect:*
http://www.securitytracker.com/id/1034978|https://helpx.adobe.com/security/products/connect/apsb16-07.html|http://www.securitytracker.com/id/1034978|https://helpx.adobe.com/security/products/connect/apsb16-07.html
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Unknown
Unknown
83.5
HIGH
adobe/connect
False
Unknown
nan
CVE-2016-0951
Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0952 and CVE-2016-0953.
2016-02-10
2026-05-06
CWE-119
adobe/bridge_cc:*|adobe/photoshop_cc:*
http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html|https://www.exploit-db.com/exploits/39429/|http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
83.5
HIGH
adobe/bridge_cc
False
Unknown
nan
CVE-2016-0952
Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0951 and CVE-2016-0953.
2016-02-10
2026-05-06
CWE-119
adobe/bridge_cc:*|adobe/photoshop_cc:*
http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html|https://www.exploit-db.com/exploits/39430/|http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
83.5
HIGH
adobe/bridge_cc
False
Unknown
nan
CVE-2016-0953
Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0951 and CVE-2016-0952.
2016-02-10
2026-05-06
CWE-119
adobe/bridge_cc:*|adobe/photoshop_cc:*
http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html|https://www.exploit-db.com/exploits/39431/|http://www.securitytracker.com/id/1034979|https://helpx.adobe.com/security/products/photoshop/apsb16-03.html
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
83.5
HIGH
adobe/bridge_cc
False
Unknown
nan
CVE-2016-1287
Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Cata...
2016-02-11
2026-05-06
CWE-119
cisco/adaptive_security_appliance_software:7.2.1|cisco/adaptive_security_appliance_software:7.2.1.9|cisco/adaptive_security_appliance_software:7.2.1.13|cisco/adaptive_security_appliance_software:7.2.1.19|cisco/adaptive_security_appliance_software:7.2.1.24|cisco/adaptive_security_appliance_software:7.2.2|cisco/adaptive_...
http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike|http://www.securitytracker.com/id/1034997|https://blog.exodusintel.com/2016/02/10/firewall-hacking/|https://www.exploit-db.com/ex...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
cisco/adaptive_security_appliance_software
False
Unknown
nan
CVE-2016-1986
HP Continuous Delivery Automation (CDA) 1.30 allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library.
2016-02-12
2026-05-06
CWE-94
hp/continuous_delivery_automation:1.3.0
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04958567|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04958567
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Code Injection
Execution
83.5
HIGH
hp/continuous_delivery_automation
False
Unknown
nan
CVE-2016-1524
Multiple unrestricted file upload vulnerabilities in NETGEAR Management System NMS300 1.5.0.11 and earlier allow remote attackers to execute arbitrary Java code by using (1) fileUpload.do or (2) lib-1.0/external/flash/fileUpload.do to upload a JSP file, and then accessing it via a direct request for a /null URI.
2016-02-13
2026-05-06
UNKNOWN
netgear/prosafe_network_management_software_300:*
http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html|http://seclists.org/fulldisclosure/2016/Feb/30|http://www.kb.cert.org/vuls/id/777024|http://www.securityfocus.com/archive/1/537446/100/0/threaded|https://www.exploit-db.com/exploits/39412/
True
9.6
CRITICAL
ADJACENT_NETWORK
LOW
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
2.8
6.0
Unknown
Unknown
87.0
CRITICAL
netgear/prosafe_network_management_software_300
False
Unknown
nan
CVE-2016-2231
The Windows-based Host Interface Program (WHIP) service on Huawei SmartAX MT882 devices V200R002B022 Arg relies on the client to send a length field that is consistent with a buffer size, which allows remote attackers to cause a denial of service (device outage) or possibly have unspecified other impact via crafted tra...
2016-02-15
2026-05-06
CWE-19
huawei/mt882_firmware:*
https://debihiga.wordpress.com/sa-whip/|https://debihiga.wordpress.com/sa-whip/
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
huawei/mt882_firmware
False
Unknown
nan
CVE-2016-0746
Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
2016-02-15
2026-05-06
CWE-416
f5/nginx:*|f5/nginx:*|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|debian/debian_linux:7.0|debian/debian_linux:8.0|debian/debian_linux:9.0|opensuse/leap:42.1|apple/xcode:*
http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html|http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html|http://seclists.org/fulldisclosure/2021/Sep/36|http://www.debian.org/security/2016/dsa-3473|http://www.securitytracker.com/id/1034869
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Use After Free
Execution
98.5
CRITICAL
f5/nginx
False
Unknown
nan
CVE-2016-2386
SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2101079.
2016-02-16
2026-04-21
CWE-89|CWE-89
sap/netweaver_application_server_java:7.40
http://packetstormsecurity.com/files/137129/SAP-NetWeaver-AS-JAVA-7.5-SQL-Injection.html|http://seclists.org/fulldisclosure/2016/May/56|https://erpscan.io/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/|https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/|https://github...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
SQL Injection
Initial Access
100.0
CRITICAL
sap/netweaver_application_server_java
True
Unknown
Apply updates per vendor instructions.
CVE-2016-2071
Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 11.x before 11.0 Build 64.34, 10.5 before 10.5 Build 59.13, and 10.5.e before Build 59.1305.e allows remote attackers to gain privileges via unspecified NS Web GUI commands.
2016-02-17
2026-05-06
CWE-264
citrix/netscaler:10.5|citrix/netscaler:10.5e|citrix/netscaler:11.0|citrix/netscaler:10.5|citrix/netscaler:10.5e|citrix/netscaler:11.0
http://support.citrix.com/article/CTX206001|http://www.securitytracker.com/id/1035098|http://support.citrix.com/article/CTX206001|http://www.securitytracker.com/id/1035098
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
citrix/netscaler
False
Unknown
nan
CVE-2016-2396
The GMS ViewPoint (GMSVP) web application in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote authenticated users to execute arbitrary commands via vectors related to configuration input.
2016-02-17
2026-05-06
CWE-77
sonicwall/analyzer:7.2|sonicwall/analyzer:8.0|sonicwall/analyzer:8.1|sonicwall/global_management_system:7.2|sonicwall/global_management_system:8.0|sonicwall/global_management_system:8.1|sonicwall/uma_em5000_firmware:7.2|sonicwall/uma_em5000_firmware:8.0|sonicwall/uma_em5000_firmware:8.1
http://www.securitytracker.com/id/1035015|http://www.zerodayinitiative.com/advisories/ZDI-16-164|https://support.software.dell.com/product-notification/185943|http://www.securitytracker.com/id/1035015|http://www.zerodayinitiative.com/advisories/ZDI-16-164
False
9.9
CRITICAL
NETWORK
LOW
LOW
NONE
CHANGED
HIGH
HIGH
HIGH
3.1
6.0
Command Injection
Execution
80.0
HIGH
sonicwall/analyzer
False
Unknown
nan
CVE-2016-2397
The cliserver implementation in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote attackers to deserialize and execute arbitrary Java code via crafted XML data.
2016-02-17
2026-05-06
CWE-77
sonicwall/uma_em5000_firmware:7.2|sonicwall/uma_em5000_firmware:8.0|sonicwall/uma_em5000_firmware:8.1|sonicwall/analyzer:7.2|sonicwall/analyzer:8.0|sonicwall/analyzer:8.1|sonicwall/global_management_system:7.2|sonicwall/global_management_system:8.0|sonicwall/global_management_system:8.1
http://www.securitytracker.com/id/1035015|http://www.zerodayinitiative.com/advisories/ZDI-16-163|https://support.software.dell.com/product-notification/185943|http://www.securitytracker.com/id/1035015|http://www.zerodayinitiative.com/advisories/ZDI-16-163
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Command Injection
Execution
98.5
CRITICAL
sonicwall/uma_em5000_firmware
False
Unknown
nan
CVE-2015-8286
Zhuhai RaySharp firmware has a hardcoded root password, which makes it easier for remote attackers to obtain access via a session on TCP port 23 or 9000.
2016-02-18
2026-05-06
CWE-254
zhuhai/raysharp_firmware:*
http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html|http://seclists.org/bugtraq/2015/Jun/117|http://www.forbes.com/sites/andygreenberg/2013/01/28/more-than-a-dozen-brands-of-security-camera-systems-vulnerable-to-hacker-hijacking/|http://www.kb.cert.org/vuls/id/899080|http://www.kb.cert.org/vuls/i...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
zhuhai/raysharp_firmware
False
Unknown
nan
CVE-2015-8151
Symantec Encryption Management Server (SEMS) 3.3.2 before MP12 allows remote authenticated users to execute arbitrary OS commands by leveraging console administrator access.
2016-02-18
2026-05-06
CWE-78
symantec/encryption_management_server:*
http://www.securityfocus.com/bid/83268|http://www.securitytracker.com/id/1035063|http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160218_00|http://www.securityfocus.com/bid/83268|http://www.securitytracker.com/id/1035063
False
9.1
CRITICAL
NETWORK
LOW
HIGH
NONE
CHANGED
HIGH
HIGH
HIGH
2.3
6.0
OS Command Injection
Execution
72.0
HIGH
symantec/encryption_management_server
False
Unknown
nan
CVE-2016-1154
SQL injection vulnerability in the Help plug-in 1.3.5 and earlier in Cuore EC-CUBE allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
2016-02-19
2026-05-06
CWE-89
cuore/ec-cube_help_plugin:*
http://jvn.jp/en/jp/JVN31524757/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000027|http://www.ec-cube.net/products/detail.php?product_id=279|http://jvn.jp/en/jp/JVN31524757/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000027
False
9.1
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
NONE
3.9
5.2
SQL Injection
Initial Access
80.0
HIGH
cuore/ec-cube_help_plugin
False
Unknown
nan
CVE-2016-2275
The web interface on Advantech/B+B SmartWorx VESP211-EU devices with firmware 1.7.2 and VESP211-232 devices with firmware 1.5.1 and 1.7.2 relies on the client to implement access control, which allows remote attackers to perform administrative actions via modified JavaScript code.
2016-02-21
2026-05-06
CWE-284
advantech/vesp211-eu_firmware:1.7.2|advantech/vesp211-232_firmware:1.5.1|advantech/vesp211-232_firmware:1.7.2
https://ics-cert.us-cert.gov/advisories/ICSA-16-049-01|https://ics-cert.us-cert.gov/advisories/ICSA-16-049-01
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
advantech/vesp211-eu_firmware
False
Unknown
nan
CVE-2015-7425
The Data Protection component in the VMware vSphere GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 6.3 before 6.3.2.5, 6.4 before 6.4.3.1, and 7.1 before 7.1.4 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Sn...
2016-02-21
2026-05-06
CWE-264
ibm/tivoli_storage_flashcopy_manager_for_vmware:3.1|ibm/tivoli_storage_flashcopy_manager_for_vmware:3.1.1|ibm/tivoli_storage_flashcopy_manager_for_vmware:3.2|ibm/tivoli_storage_flashcopy_manager_for_vmware:6.3|ibm/tivoli_storage_flashcopy_manager_for_vmware:6.4|ibm/tivoli_storage_flashcopy_manager_for_vmware:6.4.2|ibm/...
http://www-01.ibm.com/support/docview.wss?uid=swg21973086|http://www.securityfocus.com/bid/79545|http://www-01.ibm.com/support/docview.wss?uid=swg21973086|http://www.securityfocus.com/bid/79545
False
10.0
CRITICAL
NETWORK
LOW
NONE
NONE
CHANGED
HIGH
HIGH
HIGH
3.9
6.0
Other
Unknown
84.5
HIGH
ibm/tivoli_storage_flashcopy_manager_for_vmware
False
Unknown
nan
CVE-2016-1629
Google Chrome before 48.0.2564.116 allows remote attackers to bypass the Blink Same Origin Policy and a sandbox protection mechanism via unspecified vectors.
2016-02-21
2026-05-06
CWE-264
google/chrome:*|novell/suse_package_hub_for_suse_linux_enterprise:12|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2|debian/debian_linux:8.0
http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_18.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00045.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00047.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00048.html|http://rhn.redha...
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
google/chrome
False
Unknown
nan
CVE-2015-8803
The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
2016-02-23
2026-05-06
CWE-254|CWE-310
nettle_project/nettle:*|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176807.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177229.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177473.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html|htt...
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
nettle_project/nettle
False
Unknown
nan
CVE-2015-8804
x86_64/ecc-384-modp.asm in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-384 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors.
2016-02-23
2026-05-06
CWE-254|CWE-310
nettle_project/nettle:*|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2
http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html|http://rhn.redhat.com/errata/RHSA-2016-2582.html|http://www.openwall.com/lists/oss-security/2016/02/02/2
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
nettle_project/nettle
False
Unknown
nan
CVE-2015-8805
The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803.
2016-02-23
2026-05-06
CWE-310
nettle_project/nettle:*|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2
http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html|http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html|http://rhn.redhat.com/errata/RHSA-2016-2582.html|http://www.openwall.com/lists/oss-security/2016/02/02/2
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
83.5
HIGH
nettle_project/nettle
False
Unknown
nan