cve_id stringlengths 13 16 ⌀ | description stringlengths 34 2.67k ⌀ | published_date stringdate 1999-03-01 00:00:00 2018-08-06 00:00:00 ⌀ | last_modified stringdate 2024-11-21 00:00:00 2026-05-06 00:00:00 ⌀ | cwe_ids stringclasses 347
values | affected_products stringlengths 7 639 ⌀ | reference_urls stringlengths 49 643 ⌀ | exploit_available stringclasses 2
values | cvss_score stringclasses 35
values | cvss_severity stringclasses 4
values | attack_vector stringclasses 3
values | attack_complexity stringclasses 2
values | privileges_required stringclasses 3
values | user_interaction stringclasses 2
values | scope stringclasses 2
values | confidentiality_impact stringclasses 3
values | integrity_impact stringclasses 3
values | availability_impact stringclasses 3
values | exploitability_score stringclasses 12
values | impact_score stringclasses 15
values | attack_type stringclasses 33
values | likely_mitre_tactic stringclasses 7
values | risk_score stringclasses 58
values | risk_level stringclasses 4
values | primary_vendor_product stringlengths 5 107 ⌀ | in_cisa_kev stringclasses 2
values | ransomware_use stringclasses 2
values | kev_required_action stringclasses 7
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2015-8277 | Multiple buffer overflows in (1) lmgrd and (2) Vendor Daemon in Flexera FlexNet Publisher before 11.13.1.2 Security Update 1 allow remote attackers to execute arbitrary code via a crafted packet with opcode (a) 0x107 or (b) 0x10a. | 2016-02-24 | 2026-05-06 | CWE-119 | flexerasoftware/flexnet_publisher:* | http://securitymumblings.blogspot.com/2016/02/cve-2015-8277.html|http://support.citrix.com/article/CTX207824|http://www.kb.cert.org/vuls/id/485744|http://www.securityfocus.com/bid/83334|http://www.securitytracker.com/id/1035266 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | flexerasoftware/flexnet_publisher | False | Unknown | nan |
CVE-2016-1341 | Cisco NX-OS 7.0(1)N1(1), 7.0(1)N1(3), and 7.0(4)N1(1) on Nexus 2000 Fabric Extender devices has a blank root password, which allows local users to gain privileges via unspecified vectors, aka Bug ID CSCur22079. | 2016-02-24 | 2026-05-06 | CWE-255|CWE-264 | cisco/nx-os:7.0\(1\)n1\(1\)|cisco/nx-os:7.0\(1\)n1\(3\)|cisco/nx-os:7.0\(4\)n1\(1\) | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160223-nx2000|http://www.securitytracker.com/id/1035088|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160223-nx2000|http://www.securitytracker.com/id/1035088 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | cisco/nx-os | False | Unknown | nan |
CVE-2015-7261 | The FTP service in QNAP iArtist Lite before 1.4.54, as distributed with QNAP Signage Station before 2.0.1, has hardcoded credentials, which makes it easier for remote attackers to obtain access via a session on TCP port 21. | 2016-02-27 | 2026-05-06 | CWE-255 | qnap/iartist_lite:*|qnap/signage_station:* | http://www.kb.cert.org/vuls/id/444472|http://www.kb.cert.org/vuls/id/444472 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | qnap/iartist_lite | False | Unknown | nan |
CVE-2016-0212 | Stack-based buffer overflow in IBM Tivoli Storage Manager FastBack 5.5 and 6.1.x through 6.1.11.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2016-0213 and CVE-2016-0216. | 2016-02-29 | 2026-05-06 | CWE-119 | ibm/tivoli_storage_manager_fastback:5.5.0|ibm/tivoli_storage_manager_fastback:6.1.0|ibm/tivoli_storage_manager_fastback:6.1.0.0|ibm/tivoli_storage_manager_fastback:6.1.0.1|ibm/tivoli_storage_manager_fastback:6.1.1|ibm/tivoli_storage_manager_fastback:6.1.1.0|ibm/tivoli_storage_manager_fastback:6.1.2|ibm/tivoli_storage_m... | http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216|http://www.ibm.com/support/docview.wss?uid=swg21975358|http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | ibm/tivoli_storage_manager_fastback | False | Unknown | nan |
CVE-2016-0213 | Stack-based buffer overflow in IBM Tivoli Storage Manager FastBack 5.5 and 6.1.x through 6.1.11.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2016-0212 and CVE-2016-0216. | 2016-02-29 | 2026-05-06 | CWE-119 | ibm/tivoli_storage_manager_fastback:5.5.0|ibm/tivoli_storage_manager_fastback:6.1.0|ibm/tivoli_storage_manager_fastback:6.1.0.0|ibm/tivoli_storage_manager_fastback:6.1.0.1|ibm/tivoli_storage_manager_fastback:6.1.1|ibm/tivoli_storage_manager_fastback:6.1.1.0|ibm/tivoli_storage_manager_fastback:6.1.2|ibm/tivoli_storage_m... | http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216|http://www.ibm.com/support/docview.wss?uid=swg21975358|http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | ibm/tivoli_storage_manager_fastback | False | Unknown | nan |
CVE-2016-0216 | Stack-based buffer overflow in IBM Tivoli Storage Manager FastBack 5.5 and 6.1.x through 6.1.11.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2016-0212 and CVE-2016-0213. | 2016-02-29 | 2026-05-06 | CWE-119 | ibm/tivoli_storage_manager_fastback:5.5.0|ibm/tivoli_storage_manager_fastback:6.1.0|ibm/tivoli_storage_manager_fastback:6.1.0.1|ibm/tivoli_storage_manager_fastback:6.1.1|ibm/tivoli_storage_manager_fastback:6.1.1.0|ibm/tivoli_storage_manager_fastback:6.1.2|ibm/tivoli_storage_manager_fastback:6.1.2.0|ibm/tivoli_storage_m... | http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216|http://www.ibm.com/support/docview.wss?uid=swg21975358|http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | ibm/tivoli_storage_manager_fastback | False | Unknown | nan |
CVE-2016-1329 | Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote attackers to obtain root privileges via a (1) TELNET or (2) SSH session, aka Bug ID CSCuy25800. | 2016-03-03 | 2026-05-06 | CWE-287 | samsung/x14j_firmware:t-ms14jakucb-1102.5|sun/opensolaris:snv_124|zyxel/gs1900-10hp_firmware:*|zzinc/keymouse_firmware:3.08|samsung/x14j_firmware:t-ms14jakucb-1102.5|sun/opensolaris:snv_124|zyxel/gs1900-10hp_firmware:*|zzinc/keymouse_firmware:3.08 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k|http://www.securitytracker.com/id/1035161|https://isc.sans.edu/forums/diary/20795|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k|http://www.securitytracker.com/id/1035161 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 83.5 | HIGH | samsung/x14j_firmware | False | Unknown | nan |
CVE-2016-0705 | Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key. | 2016-03-03 | 2026-05-06 | UNKNOWN | oracle/mysql:*|oracle/mysql:*|openssl/openssl:1.0.1|openssl/openssl:1.0.1|openssl/openssl:1.0.1|openssl/openssl:1.0.1|openssl/openssl:1.0.1a|openssl/openssl:1.0.1b|openssl/openssl:1.0.1c|openssl/openssl:1.0.1d | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759|http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html|http://lists.opensu... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/mysql | False | Unknown | nan |
CVE-2016-0799 | The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large am... | 2016-03-03 | 2026-05-06 | CWE-119 | openssl/openssl:1.0.1|openssl/openssl:1.0.1|openssl/openssl:1.0.1|openssl/openssl:1.0.1|openssl/openssl:1.0.1a|openssl/openssl:1.0.1b|openssl/openssl:1.0.1c|openssl/openssl:1.0.1d|openssl/openssl:1.0.1e|openssl/openssl:1.0.1f | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759|http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html|http://lists.opensu... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | openssl/openssl | False | Unknown | nan |
CVE-2016-2842 | The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long s... | 2016-03-03 | 2026-05-06 | CWE-119 | openssl/openssl:1.0.1|openssl/openssl:1.0.1|openssl/openssl:1.0.1|openssl/openssl:1.0.1|openssl/openssl:1.0.1a|openssl/openssl:1.0.1b|openssl/openssl:1.0.1c|openssl/openssl:1.0.1d|openssl/openssl:1.0.1e|openssl/openssl:1.0.1f | http://marc.info/?l=bugtraq&m=145983526810210&w=2|http://marc.info/?l=bugtraq&m=146108058503441&w=2|http://openssl.org/news/secadv/20160301.txt|http://rhn.redhat.com/errata/RHSA-2016-0722.html|http://rhn.redhat.com/errata/RHSA-2016-0996.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | openssl/openssl | False | Unknown | nan |
CVE-2016-1633 | Use-after-free vulnerability in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | 2016-03-06 | 2026-05-06 | UNKNOWN | google/chrome:* | http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html|http://lists.opensu... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-1635 | extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via... | 2016-03-06 | 2026-05-06 | UNKNOWN | google/chrome:* | http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html|http://lists.opensu... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-1636 | The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection me... | 2016-03-06 | 2026-05-06 | CWE-264 | google/chrome:* | http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html|http://lists.opensu... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-1639 | Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on t... | 2016-03-06 | 2026-05-06 | UNKNOWN | google/chrome:* | http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html|http://lists.opensu... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-1642 | Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | 2016-03-06 | 2026-05-06 | UNKNOWN | google/chrome:* | http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html|http://lists.opensu... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-2843 | Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | 2016-03-06 | 2026-05-06 | UNKNOWN | google/chrome:*|google/v8:* | http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html|http://www.securitytracker.com/id/1035185|http://www.ubuntu.com/usn/USN-2920-1|http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html|http://www.securitytracker.com/id/1035185 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-0132 | Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 mishandles signature validation for unspecified elements of XML documents, which allows remote attackers to spoof signatures via a modified document, aka ".NET XML Validation Security Feature Bypass." | 2016-03-09 | 2026-05-06 | CWE-20 | microsoft/.net_framework:2.0|microsoft/.net_framework:3.0|microsoft/.net_framework:3.5|microsoft/.net_framework:3.5.1|microsoft/.net_framework:4.5.2|microsoft/.net_framework:4.6|microsoft/.net_framework:4.6.1 | http://www.securityfocus.com/bid/84075|http://www.securitytracker.com/id/1035213|https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-035|http://www.securityfocus.com/bid/84075|http://www.securitytracker.com/id/1035213 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | microsoft/.net_framework | False | Unknown | nan |
CVE-2016-0954 | Adobe Digital Editions before 4.5.1 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | 2016-03-09 | 2026-05-06 | CWE-119 | adobe/digital_editions:* | http://www.securityfocus.com/bid/84214|http://www.securitytracker.com/id/1035201|https://helpx.adobe.com/security/products/Digital-Editions/apsb16-06.html|https://www.exploit-db.com/exploits/39533/|http://www.securityfocus.com/bid/84214 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/digital_editions | False | Unknown | nan |
CVE-2016-1007 | Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-03-09 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:* | http://www.securityfocus.com/bid/84215|http://www.securitytracker.com/id/1035199|http://www.zerodayinitiative.com/advisories/ZDI-16-189|https://helpx.adobe.com/security/products/acrobat/apsb16-09.html|http://www.securityfocus.com/bid/84215 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1009 | Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-03-09 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:* | http://www.securityfocus.com/bid/84215|http://www.securitytracker.com/id/1035199|http://www.zerodayinitiative.com/advisories/ZDI-16-191|https://helpx.adobe.com/security/products/acrobat/apsb16-09.html|http://www.securityfocus.com/bid/84215 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1327 | Buffer overflow in the web server on Cisco DPC2203 and EPC2203 devices with firmware r1_customer_image allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCuv05935. | 2016-03-09 | 2026-05-06 | CWE-119 | cisco/dpc2203_cable_modem_firmware:r1_customer_image_base|cisco/epc2203_cable_modem_firmware:r1_customer_image_base | http://www.securityfocus.com/bid/84279|http://www.securitytracker.com/id/1035235|https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-cmre|http://www.securityfocus.com/bid/84279|http://www.securitytracker.com/id/1035235 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | cisco/dpc2203_cable_modem_firmware | False | Unknown | nan |
CVE-2015-7411 | The portal client in IBM Tivoli Monitoring (ITM) 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 through FP6 allows remote authenticated users to gain privileges via unspecified vectors. | 2016-03-12 | 2026-05-06 | CWE-264 | ibm/tivoli_monitoring:6.2.2|ibm/tivoli_monitoring:6.2.2.1|ibm/tivoli_monitoring:6.2.2.2|ibm/tivoli_monitoring:6.2.2.3|ibm/tivoli_monitoring:6.2.2.4|ibm/tivoli_monitoring:6.2.2.5|ibm/tivoli_monitoring:6.2.2.6|ibm/tivoli_monitoring:6.2.2.7|ibm/tivoli_monitoring:6.2.2.8|ibm/tivoli_monitoring:6.2.2.9 | http://www-01.ibm.com/support/docview.wss?uid=swg1IV77992|http://www-01.ibm.com/support/docview.wss?uid=swg21973559|http://www.securitytracker.com/id/1035240|http://www-01.ibm.com/support/docview.wss?uid=swg1IV77992|http://www-01.ibm.com/support/docview.wss?uid=swg21973559 | False | 9.9 | CRITICAL | NETWORK | LOW | LOW | NONE | CHANGED | HIGH | HIGH | HIGH | 3.1 | 6.0 | Other | Unknown | 80.0 | HIGH | ibm/tivoli_monitoring | False | Unknown | nan |
CVE-2016-0815 | The MPEG4Source::fragmentedRead function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.x before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 26... | 2016-03-12 | 2026-05-06 | CWE-20 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-03-01.html|http://www.securityfocus.com/bid/84235|https://android.googlesource.com/platform%2Fframeworks%2Fav/+/5403587a74aee2fb57076528c3927851531c8afb|http://source.android.com/security/bulletin/2016-03-01.html|http://www.securityfocus.com/bid/84235 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-0816 | mediaserver in Android 6.x before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to decoder/ih264d_parse_islice.c and decoder/ih264d_parse_pslice.c, aka internal bug 25928803. | 2016-03-12 | 2026-05-06 | CWE-119 | google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-03-01.html|http://www.securityfocus.com/bid/84235|https://android.googlesource.com/platform/external/libavc/+/4a524d3a8ae9aa20c36430008e6bd429443f8f1d|http://source.android.com/security/bulletin/2016-03-01.html|http://www.securityfocus.com/bid/84235 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-1621 | libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792. | 2016-03-12 | 2026-05-06 | CWE-119 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179128.html|http://source.android.com/security/bulletin/2016-03-01.html|http://www.securityfocus.com/bid/84239|https://android.googlesource.com/platform/external/libvpx/+/04839626ed859623901ebd3a5fd483982186b59d|https://android.googlesource.com/platfo... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-1962 | Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections. | 2016-03-13 | 2026-05-06 | UNKNOWN | mozilla/firefox:*|mozilla/firefox:38.0|mozilla/firefox:38.0.1|mozilla/firefox:38.0.5|mozilla/firefox:38.1.0|mozilla/firefox:38.1.1|mozilla/firefox:38.2.0|mozilla/firefox:38.2.1|mozilla/firefox:38.3.0|mozilla/firefox:38.4.0 | http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html|http://lists.opensus... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | mozilla/firefox | False | Unknown | nan |
CVE-2016-1988 | HPE Network Automation 9.22 through 9.22.02 and 10.x before 10.00.02 allows remote attackers to execute arbitrary code or obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-1989. | 2016-03-15 | 2026-05-06 | UNKNOWN | hp/network_automation:9.22|hp/network_automation:9.22.01|hp/network_automation:9.22.02|hp/network_automation:10.00|hp/network_automation:10.00.01 | http://www.securitytracker.com/id/1035192|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05030906|http://www.securitytracker.com/id/1035192|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05030906 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | hp/network_automation | False | Unknown | nan |
CVE-2016-1989 | HPE Network Automation 9.22 through 9.22.02 and 10.x before 10.00.02 allows remote attackers to execute arbitrary code or obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-1988. | 2016-03-15 | 2026-05-06 | UNKNOWN | hp/network_automation:9.22|hp/network_automation:9.22.01|hp/network_automation:9.22.02|hp/network_automation:10.00|hp/network_automation:10.00.01 | http://www.securitytracker.com/id/1035192|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05030906|http://www.securitytracker.com/id/1035192|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05030906 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | hp/network_automation | False | Unknown | nan |
CVE-2016-2345 | Stack-based buffer overflow in dwrcs.exe in the dwmrcs daemon in SolarWinds DameWare Mini Remote Control 12.0 allows remote attackers to execute arbitrary code via a crafted string. | 2016-03-17 | 2026-05-06 | CWE-119 | dameware/mini_remote_control:12.0 | http://packetstormsecurity.com/files/136293/Solarwinds-Dameware-Mini-Remote-Code-Execution.html|http://www.kb.cert.org/vuls/id/897144|http://www.securityfocus.com/archive/1/537823/100/0/threaded|https://www.securifera.com/advisories/CVE-2016-2345|http://packetstormsecurity.com/files/136293/Solarwinds-Dameware-Mini-Remo... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | dameware/mini_remote_control | False | Unknown | nan |
CVE-2016-3191 | The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow)... | 2016-03-17 | 2026-05-06 | CWE-119 | pcre/pcre:8.00|pcre/pcre:8.01|pcre/pcre:8.02|pcre/pcre:8.10|pcre/pcre:8.11|pcre/pcre:8.12|pcre/pcre:8.13|pcre/pcre:8.20|pcre/pcre:8.21|pcre/pcre:8.30 | http://rhn.redhat.com/errata/RHSA-2016-1025.html|http://vcs.pcre.org/pcre2?view=revision&revision=489|http://vcs.pcre.org/pcre?view=revision&revision=1631|http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886|http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | pcre/pcre | False | Unknown | nan |
CVE-2016-1995 | HPE System Management Homepage before 7.5.4 allows remote attackers to execute arbitrary code via unspecified vectors. | 2016-03-18 | 2026-05-06 | UNKNOWN | hp/system_management_homepage:* | http://www.securitytracker.com/id/1035325|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763|http://www.securitytracker.com/id/1035325|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | hp/system_management_homepage | False | Unknown | nan |
CVE-2016-2245 | HP Support Assistant before 8.1.52.1 allows remote attackers to bypass authentication via unspecified vectors. | 2016-03-19 | 2026-05-06 | CWE-287 | hp/support_assistant:* | https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05031674|https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05031674 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 83.5 | HIGH | hp/support_assistant | False | Unknown | nan |
CVE-2016-1997 | HPE Operations Orchestration 10.x before 10.51 and Operations Orchestration content before 1.7.0 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library. | 2016-03-22 | 2026-05-06 | CWE-20 | hp/operations_orchestration:10.0|hp/operations_orchestration:10.01|hp/operations_orchestration:10.02|hp/operations_orchestration:10.10|hp/operations_orchestration:10.20|hp/operations_orchestration:10.21|hp/operations_orchestration:10.22|hp/operations_orchestration:10.22.1|hp/operations_orchestration:10.50|hp/operations... | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05050545|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05050545 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | hp/operations_orchestration | False | Unknown | nan |
CVE-2016-1998 | HPE Service Manager (SM) 9.3x before 9.35 P4 and 9.4x before 9.41.P2 allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library. | 2016-03-22 | 2026-05-06 | CWE-20 | hp/service_manager:9.30|hp/service_manager:9.31|hp/service_manager:9.32|hp/service_manager:9.33|hp/service_manager:9.34|hp/service_manager:9.35|hp/service_manager:9.40|hp/service_manager:9.41 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054565|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054565 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | hp/service_manager | False | Unknown | nan |
CVE-2015-6853 | The Domino web agent in CA Single Sign-On (aka SSO, formerly SiteMinder) R6, R12.0 before SP3 CR13, R12.0J before SP3 CR1.2, R12.5 before CR5, R12.51 before CR4, and R12.52 before SP1 CR3 allows remote attackers to cause a denial of service (daemon crash) or obtain sensitive information via a crafted request. | 2016-03-24 | 2026-05-06 | CWE-345 | broadcom/single_sign-on:r6.0|broadcom/single_sign-on:r12.0|broadcom/single_sign-on:r12.0j|broadcom/single_sign-on:r12.5|broadcom/single_sign-on:r12.51|broadcom/single_sign-on:r12.52 | http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20160323-01-security-notice-for-ca-single-sign-on-web-agents.aspx|http://www.securitytracker.com/id/1035389|http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20160323... | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | Other | Unknown | 80.0 | HIGH | broadcom/single_sign-on | False | Unknown | nan |
CVE-2015-6854 | The non-Domino web agents in CA Single Sign-On (aka SSO, formerly SiteMinder) R6, R12.0 before SP3 CR13, R12.0J before SP3 CR1.2, and R12.5 before CR5 allow remote attackers to cause a denial of service (daemon crash) or obtain sensitive information via a crafted request. | 2016-03-24 | 2026-05-06 | CWE-345 | broadcom/single_sign-on:r6.0|broadcom/single_sign-on:r12.0|broadcom/single_sign-on:r12.0j|broadcom/single_sign-on:r12.5 | http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20160323-01-security-notice-for-ca-single-sign-on-web-agents.aspx|http://www.securitytracker.com/id/1035389|http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20160323... | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | Other | Unknown | 80.0 | HIGH | broadcom/single_sign-on | False | Unknown | nan |
CVE-2016-1741 | The NVIDIA driver in the Graphics Drivers subsystem in Apple OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | 2016-03-24 | 2026-05-06 | CWE-119 | apple/mac_os_x:* | http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html|http://www.securitytracker.com/id/1035363|https://support.apple.com/HT206167|https://www.exploit-db.com/exploits/39615/|http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | apple/mac_os_x | False | Unknown | nan |
CVE-2016-1761 | libxml2 in Apple iOS before 9.3, OS X before 10.11.4, and watchOS before 2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document. | 2016-03-24 | 2026-05-06 | CWE-119 | apple/iphone_os:*|apple/mac_os_x:*|apple/watchos:* | http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html|http://www.securitytracker.com/id/1035353|http://www.zerodayinitiative.com/advisories/ZDI-16-203 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | apple/iphone_os | False | Unknown | nan |
CVE-2016-3141 | Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var el... | 2016-03-31 | 2026-05-06 | CWE-119 | apple/mac_os_x:*|php/php:*|php/php:5.6.0|php/php:5.6.1|php/php:5.6.2|php/php:5.6.3|php/php:5.6.4|php/php:5.6.5|php/php:5.6.6|php/php:5.6.7 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=b1bd4119bcafab6f9a8f84d92cd65eec3afeface|http://lists.apple.com/archives/security-announce/2016/May/msg00004.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html|http://... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | apple/mac_os_x | False | Unknown | nan |
CVE-2016-2343 | Patterson Dental Eaglesoft 17 has a hardcoded password of sql for the dba account, which allows remote attackers to obtain sensitive Dental.DB patient information via SQL statements. | 2016-04-01 | 2026-05-06 | UNKNOWN | patterson_dental/eaglesoft:17.0 | http://justinshafer.blogspot.com/2016/02/moving-onto-eaglesoft-aka-patterson.html|http://www.kb.cert.org/vuls/id/344432|http://justinshafer.blogspot.com/2016/02/moving-onto-eaglesoft-aka-patterson.html|http://www.kb.cert.org/vuls/id/344432 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | patterson_dental/eaglesoft | False | Unknown | nan |
CVE-2015-8519 | Buffer overflow in the server in IBM Tivoli Storage Manager FastBack 5.5.x and 6.x before 6.1.12.2 allows remote attackers to execute arbitrary code via a crafted command, a different vulnerability than CVE-2015-8520, CVE-2015-8521, and CVE-2015-8522. | 2016-04-05 | 2026-05-06 | CWE-119 | ibm/tivoli_storage_manager_fastback:5.5.0|ibm/tivoli_storage_manager_fastback:6.1.0|ibm/tivoli_storage_manager_fastback:6.1.0.1|ibm/tivoli_storage_manager_fastback:6.1.1|ibm/tivoli_storage_manager_fastback:6.1.1.0|ibm/tivoli_storage_manager_fastback:6.1.2|ibm/tivoli_storage_manager_fastback:6.1.2.0|ibm/tivoli_storage_m... | http://www-01.ibm.com/support/docview.wss?uid=swg21975536|http://www.securityfocus.com/bid/84161|http://www-01.ibm.com/support/docview.wss?uid=swg21975536|http://www.securityfocus.com/bid/84161 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | ibm/tivoli_storage_manager_fastback | False | Unknown | nan |
CVE-2015-8520 | Buffer overflow in the server in IBM Tivoli Storage Manager FastBack 5.5.x and 6.x before 6.1.12.2 allows remote attackers to execute arbitrary code via a crafted command, a different vulnerability than CVE-2015-8519, CVE-2015-8521, and CVE-2015-8522. | 2016-04-05 | 2026-05-06 | CWE-119 | ibm/tivoli_storage_manager_fastback:5.5.0|ibm/tivoli_storage_manager_fastback:6.1.0|ibm/tivoli_storage_manager_fastback:6.1.0.1|ibm/tivoli_storage_manager_fastback:6.1.1|ibm/tivoli_storage_manager_fastback:6.1.1.0|ibm/tivoli_storage_manager_fastback:6.1.2|ibm/tivoli_storage_manager_fastback:6.1.2.0|ibm/tivoli_storage_m... | http://www-01.ibm.com/support/docview.wss?uid=swg21975536|http://www.securityfocus.com/bid/84166|http://www-01.ibm.com/support/docview.wss?uid=swg21975536|http://www.securityfocus.com/bid/84166 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | ibm/tivoli_storage_manager_fastback | False | Unknown | nan |
CVE-2015-8521 | Buffer overflow in the server in IBM Tivoli Storage Manager FastBack 5.5.x and 6.x before 6.1.12.2 allows remote attackers to execute arbitrary code via a crafted command, a different vulnerability than CVE-2015-8519, CVE-2015-8520, and CVE-2015-8522. | 2016-04-05 | 2026-05-06 | CWE-119 | ibm/tivoli_storage_manager_fastback:5.5.0|ibm/tivoli_storage_manager_fastback:6.1.0|ibm/tivoli_storage_manager_fastback:6.1.0.1|ibm/tivoli_storage_manager_fastback:6.1.1|ibm/tivoli_storage_manager_fastback:6.1.1.0|ibm/tivoli_storage_manager_fastback:6.1.2|ibm/tivoli_storage_manager_fastback:6.1.2.0|ibm/tivoli_storage_m... | http://www-01.ibm.com/support/docview.wss?uid=swg21975536|http://www.securityfocus.com/bid/84167|http://www-01.ibm.com/support/docview.wss?uid=swg21975536|http://www.securityfocus.com/bid/84167 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | ibm/tivoli_storage_manager_fastback | False | Unknown | nan |
CVE-2015-8522 | Buffer overflow in the server in IBM Tivoli Storage Manager FastBack 5.5.x and 6.x before 6.1.12.2 allows remote attackers to execute arbitrary code via a crafted command, a different vulnerability than CVE-2015-8519, CVE-2015-8520, and CVE-2015-8521. | 2016-04-05 | 2026-05-06 | CWE-119 | ibm/tivoli_storage_manager_fastback:5.5.0|ibm/tivoli_storage_manager_fastback:6.1.0|ibm/tivoli_storage_manager_fastback:6.1.0.1|ibm/tivoli_storage_manager_fastback:6.1.1|ibm/tivoli_storage_manager_fastback:6.1.1.0|ibm/tivoli_storage_manager_fastback:6.1.2|ibm/tivoli_storage_manager_fastback:6.1.2.0|ibm/tivoli_storage_m... | http://www-01.ibm.com/support/docview.wss?uid=swg21975536|http://www.securityfocus.com/bid/84163|http://www-01.ibm.com/support/docview.wss?uid=swg21975536|http://www.securityfocus.com/bid/84163 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | ibm/tivoli_storage_manager_fastback | False | Unknown | nan |
CVE-2016-2000 | HPE Asset Manager 9.40, 9.41, and 9.50 and Asset Manager CloudSystem Chargeback 9.40 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library. | 2016-04-05 | 2026-05-06 | CWE-19 | hp/asset_manager:9.40|hp/asset_manager:9.41|hp/asset_manager:9.50|hp/asset_manager_cloudsystem_chargeback:9.40 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05064889|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05064889 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | hp/asset_manager | False | Unknown | nan |
CVE-2015-7921 | The FTP server in Pro-face GP-Pro EX EX-ED before 4.05.000, PFXEXEDV before 4.05.000, PFXEXEDLS before 4.05.000, and PFXEXGRPLS before 4.05.000 has hardcoded credentials, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of these credentials. | 2016-04-06 | 2026-05-06 | CWE-255 | schneider-electric/proface_gp-pro_ex_ex-ed:*|schneider-electric/proface_gp-pro_ex_pfxexedls:*|schneider-electric/proface_gp-pro_ex_pfxexedv:*|schneider-electric/proface_gp-pro_ex_pfxexgrpls:* | https://ics-cert.us-cert.gov/advisories/ICSA-16-096-01|https://ics-cert.us-cert.gov/advisories/ICSA-16-096-01 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Other | Unknown | 95.0 | CRITICAL | schneider-electric/proface_gp-pro_ex_ex-ed | False | Unknown | nan |
CVE-2016-1291 | Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allow remote attackers to execute arbitrary code via crafted deserialized data in an HTTP POST request, aka Bug ID CSCuw03192. | 2016-04-06 | 2026-05-06 | CWE-20 | cisco/evolved_programmable_network_manager:1.2.0|cisco/prime_infrastructure:1.2|cisco/prime_infrastructure:1.2.0.103|cisco/prime_infrastructure:1.2.1|cisco/prime_infrastructure:1.3|cisco/prime_infrastructure:1.3.0.20|cisco/prime_infrastructure:1.4|cisco/prime_infrastructure:1.4.0.45|cisco/prime_infrastructure:1.4.1|cis... | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-remcode|http://www.securitytracker.com/id/1035497|https://blogs.securiteam.com/index.php/archives/2727|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-remcode|http://www.securitytracker.com/id/1... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | cisco/evolved_programmable_network_manager | False | Unknown | nan |
CVE-2016-1313 | Cisco UCS Invicta C3124SA Appliance 4.3.1 through 5.0.1, UCS Invicta Scaling System and Appliance, and Whiptail Racerunner improperly store a default SSH private key, which allows remote attackers to obtain root access via unspecified vectors, aka Bug ID CSCun71294. | 2016-04-06 | 2026-05-06 | CWE-264 | cisco/ucs_invicta_c3124sa_appliance:4.3.1|cisco/ucs_invicta_c3124sa_appliance:4.5.0|cisco/ucs_invicta_c3124sa_appliance:5.0.1 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-ucs|http://www.securitytracker.com/id/1035496|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-ucs|http://www.securitytracker.com/id/1035496 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | cisco/ucs_invicta_c3124sa_appliance | False | Unknown | nan |
CVE-2016-1019 | Adobe Flash Player 21.0.0.197 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016. | 2016-04-07 | 2026-04-21 | UNKNOWN | adobe/flash_player_desktop_runtime:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/air_desktop_runtime:*|adobe/air_sdk:*|adobe/air_sdk_\&_compiler:* | http://blogs.adobe.com/psirt/?p=1330|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00009.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00010.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00012.html|http://lists.opensuse.org/opensuse-security-announce/2016-... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 100.0 | CRITICAL | adobe/flash_player_desktop_runtime | True | Known | The impacted product is end-of-life and should be disconnected if still in use. |
CVE-2016-3974 | XML external entity (XXE) vulnerability in the Configuration Wizard in SAP NetWeaver Java AS 7.1 through 7.5 allows remote attackers to cause a denial of service, conduct SMB Relay attacks, or access arbitrary files via a crafted XML request to _tc~monitoring~webservice~web/ServerNodesWSService, aka SAP Security Note 2... | 2016-04-07 | 2026-05-06 | CWE-611 | sap/netweaver_application_server_java:* | http://packetstormsecurity.com/files/137527/SAP-NetWeaver-AS-JAVA-7.5-XXE-Injection.html|http://seclists.org/fulldisclosure/2016/Jun/41|https://erpscan.io/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/|https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/|https://www.exploit-d... | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | XML External Entity (XXE) | Initial Access | 95.0 | CRITICAL | sap/netweaver_application_server_java | False | Unknown | nan |
CVE-2016-0729 | Multiple buffer overflows in (1) internal/XMLReader.cpp, (2) util/XMLURL.cpp, and (3) util/XMLUri.cpp in the XML Parser library in Apache Xerces-C before 3.1.3 allow remote attackers to cause a denial of service (segmentation fault or memory corruption) or possibly execute arbitrary code via a crafted document. | 2016-04-07 | 2026-05-06 | CWE-119 | samsung/x14j_firmware:t-ms14jakucb-1102.5|fedoraproject/fedora:22|fedoraproject/fedora:23|fedoraproject/fedora:24 | http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182062.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182131.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182597.html|http://lists.opensuse.org/opensuse-updates/2016-04/msg00012.html|http://lists... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | samsung/x14j_firmware | False | Unknown | nan |
CVE-2016-0788 | The remoting module in Jenkins before 1.650 and LTS before 1.642.2 allows remote attackers to execute arbitrary code by opening a JRMP listener. | 2016-04-07 | 2026-05-06 | CWE-264 | jenkins/jenkins:1.642.1|jenkins/jenkins:*|redhat/openshift:3.1 | http://rhn.redhat.com/errata/RHSA-2016-1773.html|https://access.redhat.com/errata/RHSA-2016:0711|https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24|http://rhn.redhat.com/errata/RHSA-2016-1773.html|https://access.redhat.com/errata/RHSA-2016:0711 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | jenkins/jenkins | False | Unknown | nan |
CVE-2016-0791 | Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach. | 2016-04-07 | 2026-05-06 | CWE-200 | redhat/openshift:3.1|jenkins/jenkins:*|jenkins/jenkins:1.642.1 | http://rhn.redhat.com/errata/RHSA-2016-1773.html|https://access.redhat.com/errata/RHSA-2016:0711|https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24|http://rhn.redhat.com/errata/RHSA-2016-1773.html|https://access.redhat.com/errata/RHSA-2016:0711 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Information Disclosure | Collection | 83.5 | HIGH | redhat/openshift | False | Unknown | nan |
CVE-2016-2563 | Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request. | 2016-04-07 | 2026-05-06 | CWE-119 | 9bis/kitty:*|simon_tatham/putty:* | http://lists.opensuse.org/opensuse-updates/2016-05/msg00131.html|http://seclists.org/fulldisclosure/2016/Mar/22|http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-pscp-sink-sscanf.html|http://www.securityfocus.com/bid/84296|http://www.securitytracker.com/id/1035257 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | 9bis/kitty | False | Unknown | nan |
CVE-2016-2851 | Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a series of large OTR messages, which triggers a heap-based buffer overflow. | 2016-04-07 | 2026-05-06 | CWE-119 | debian/debian_linux:7.0|debian/debian_linux:8.0|opensuse/leap:42.1|opensuse/opensuse:13.2|cypherpunks/libotr:* | http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00021.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00030.html|http://seclists.org/fulldisclosure/2016/Mar/21|http://www.debian.org/security/2016/dsa-3512|http://www.securityfocus.com/archive/1/537745/100/0/threaded | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | debian/debian_linux | False | Unknown | nan |
CVE-2016-2315 | revision.c in git before 2.7.4 uses an incorrect integer data type, which allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow. | 2016-04-08 | 2026-05-06 | CWE-119 | suse/linux_enterprise_debuginfo:11|suse/openstack_cloud:5|opensuse/leap:42.1|opensuse/opensuse:13.2|suse/linux_enterprise_server:12|suse/linux_enterprise_software_development_kit:11|suse/linux_enterprise_software_development_kit:12|suse/linux_enterprise_software_development_kit:12|suse/suse_linux_enterprise_server:12|g... | http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html|ht... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | suse/linux_enterprise_debuginfo | False | Unknown | nan |
CVE-2016-2324 | Integer overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow. | 2016-04-08 | 2026-05-06 | CWE-119 | suse/linux_enterprise_debuginfo:11|suse/openstack_cloud:5|opensuse/leap:42.1|opensuse/opensuse:13.2|suse/linux_enterprise_server:12.0|suse/linux_enterprise_software_development_kit:11|suse/linux_enterprise_software_development_kit:12|suse/linux_enterprise_software_development_kit:12.0|suse/suse_linux_enterprise_server:... | http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html|ht... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | suse/linux_enterprise_debuginfo | False | Unknown | nan |
CVE-2016-3153 | SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote attackers to execute arbitrary PHP code by adding content, related to the filtrer_entites function. | 2016-04-08 | 2026-05-06 | CWE-94 | debian/debian_linux:7.0|debian/debian_linux:8.0|spip/spip:2.0.0|spip/spip:2.0.1|spip/spip:2.0.2|spip/spip:2.0.3|spip/spip:2.0.4|spip/spip:2.0.5|spip/spip:2.0.6|spip/spip:2.0.7 | http://www.debian.org/security/2016/dsa-3518|https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr|https://core.spip.net/projects/spip/repository/revisions/22911|http://www.debian.org/security/2016/dsa-3518|https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Code Injection | Execution | 83.5 | HIGH | debian/debian_linux | False | Unknown | nan |
CVE-2016-3154 | The encoder_contexte_ajax function in ecrire/inc/filtres.php in SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object. | 2016-04-08 | 2026-05-06 | CWE-94 | spip/spip:2.0.0|spip/spip:2.0.1|spip/spip:2.0.2|spip/spip:2.0.3|spip/spip:2.0.4|spip/spip:2.0.5|spip/spip:2.0.6|spip/spip:2.0.7|spip/spip:2.0.8|spip/spip:2.0.9 | http://www.debian.org/security/2016/dsa-3518|https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr|https://core.spip.net/projects/spip/repository/revisions/22903|http://www.debian.org/security/2016/dsa-3518|https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Code Injection | Execution | 83.5 | HIGH | spip/spip | False | Unknown | nan |
CVE-2016-2385 | Heap-based buffer overflow in the encode_msg function in encode_msg.c in the SEAS module in Kamailio (formerly OpenSER and SER) before 4.3.5 allows remote attackers to cause a denial of service (memory corruption and process crash) or possibly execute arbitrary code via a large SIP packet. | 2016-04-11 | 2026-05-06 | CWE-119 | debian/debian_linux:8.0|kamailio/kamailio:* | http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html|http://www.debian.org/security/2016/dsa-3535|http://www.debian.org/security/2016/dsa-3537|http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog|http://www.securityfocus.com/archive/1/537926/100/0/threaded | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | debian/debian_linux | False | Unknown | nan |
CVE-2016-3065 | The (1) brin_page_type and (2) brin_metapage_info functions in the pageinspect extension in PostgreSQL before 9.5.x before 9.5.2 allows attackers to bypass intended access restrictions and consequently obtain sensitive server memory information or cause a denial of service (server crash) via a crafted bytea value in a ... | 2016-04-11 | 2026-05-06 | CWE-264 | postgresql/postgresql:9.5|postgresql/postgresql:9.5.1 | http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=bf78a6f107949fdfb513d1b45e30cefe04e09e4f|http://www.postgresql.org/about/news/1656/|http://www.postgresql.org/docs/current/static/release-9-5-2.html|http://www.securitytracker.com/id/1035468|http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=comm... | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | Other | Unknown | 80.0 | HIGH | postgresql/postgresql | False | Unknown | nan |
CVE-2015-8710 | The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment. | 2016-04-11 | 2026-05-06 | CWE-119 | xmlsoft/libxml2:*|debian/debian_linux:7.0|debian/debian_linux:8.0|debian/debian_linux:9.0 | http://rhn.redhat.com/errata/RHSA-2016-1089.html|http://www.debian.org/security/2015/dsa-3430|http://www.openwall.com/lists/oss-security/2015/04/19/4|http://www.openwall.com/lists/oss-security/2015/09/13/1|http://www.openwall.com/lists/oss-security/2015/12/31/7 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | xmlsoft/libxml2 | False | Unknown | nan |
CVE-2015-8833 | Use-after-free vulnerability in the create_smp_dialog function in gtk-dialog.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 4.0.2 for Pidgin allows remote attackers to execute arbitrary code via vectors related to the "Authenticate buddy" menu item. | 2016-04-12 | 2026-05-06 | UNKNOWN | cypherpunks/pidgin-otr:* | http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00095.html|http://lists.opensuse.org/opensuse-updates/2016-03/msg00109.html|http://www.debian.org/security/2016/dsa-3528|http://www.openwall.com/lists/oss-security/2016/03/09/13|http://www.openwall.com/lists/oss-security/2016/03/09/8 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | cypherpunks/pidgin-otr | False | Unknown | nan |
CVE-2015-8841 | Heap-based buffer overflow in the Archive support module in ESET NOD32 before update 11861 allows remote attackers to execute arbitrary code via a large number of languages in an EPOC installation file of type SIS_FILE_MULTILANG. | 2016-04-12 | 2026-05-06 | CWE-787 | eset/nod32:-|eset/nod32:-|eset/nod32:-|eset/nod32:-|eset/nod32:-|eset/nod32:-|eset/nod32:-|eset/nod32:-|eset/nod32:-|eset/nod32:- | http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html|http://www.virusradar.com/en/update/info/11861|https://bugs.chromium.org/p/project-zero/issues/detail?id=466|http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html|http://www.virusradar.com/en/update/info/11861 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Out-of-Bounds Write | Execution | 98.5 | CRITICAL | eset/nod32 | False | Unknown | nan |
CVE-2016-3987 | The HTTP server in Trend Micro Password Manager allows remote web servers to execute arbitrary commands via the url parameter to (1) api/openUrlInDefaultBrowser or (2) api/showSB. | 2016-04-12 | 2026-05-06 | CWE-284 | trendmicro/password_manager:- | http://blog.trendmicro.com/information-on-reported-vulnerabilities-in-trend-micro-password-manager/|http://packetstormsecurity.com/files/135222/TrendMicro-Node.js-HTTP-Server-Command-Execution.html|http://www.securitytracker.com/id/1034662|https://code.google.com/p/google-security-research/issues/detail?id=693|https://... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | trendmicro/password_manager | False | Unknown | nan |
CVE-2016-0733 | The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid username. | 2016-04-12 | 2026-05-06 | CWE-287 | apache/ranger:* | http://www.securityfocus.com/bid/82871|https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger|https://issues.apache.org/jira/browse/RANGER-835|https://mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114ECA%25vel%40apache.org%3E|http://www.securityfocus.com/bid/82871 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 83.5 | HIGH | apache/ranger | False | Unknown | nan |
CVE-2016-2170 | Apache OFBiz 12.04.x before 12.04.06 and 13.07.x before 13.07.03 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library. | 2016-04-12 | 2026-05-06 | CWE-20 | apache/ofbiz:*|apache/ofbiz:* | http://ofbiz.apache.org/download.html#vulnerabilities|http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html|http://www.securityfocus.com/archive/1/538034/100/0/threaded|http://www.securitytracker.com/id/1035513|https://blogs.apache.org/ofbiz/entry/announce_apache_ofbiz_1... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | apache/ofbiz | False | Unknown | nan |
CVE-2016-3655 | The management web interface in Palo Alto Networks PAN-OS before 5.0.18, 6.0.x before 6.0.13, 6.1.x before 6.1.10, and 7.0.x before 7.0.5 allows remote attackers to execute arbitrary OS commands via an unspecified API call. | 2016-04-12 | 2026-05-06 | CWE-20|CWE-78 | paloaltonetworks/pan-os:*|paloaltonetworks/pan-os:*|paloaltonetworks/pan-os:*|paloaltonetworks/pan-os:*|paloaltonetworks/pan-os:* | https://security.paloaltonetworks.com/CVE-2016-3655|https://security.paloaltonetworks.com/CVE-2016-3655 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Execution | 83.5 | HIGH | paloaltonetworks/pan-os | False | Unknown | nan |
CVE-2016-3657 | Buffer overflow in the GlobalProtect Portal in Palo Alto Networks PAN-OS before 5.0.18, 6.0.x before 6.0.13, 6.1.x before 6.1.10, and 7.0.x before 7.0.5 allows remote attackers to cause a denial of service (device crash) or possibly execute arbitrary code via an SSL VPN request. | 2016-04-12 | 2026-05-06 | CWE-119 | paloaltonetworks/pan-os:*|paloaltonetworks/pan-os:*|paloaltonetworks/pan-os:*|paloaltonetworks/pan-os:*|paloaltonetworks/pan-os:* | https://security.paloaltonetworks.com/CVE-2016-3657|https://security.paloaltonetworks.com/CVE-2016-3657 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | paloaltonetworks/pan-os | False | Unknown | nan |
CVE-2016-0088 | Hyper-V in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." | 2016-04-12 | 2026-05-06 | CWE-284 | microsoft/windows_10:*|microsoft/windows_8.1:*|microsoft/windows_server_2012:-|microsoft/windows_server_2012:r2 | http://www.securitytracker.com/id/1035538|https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-045|http://www.securitytracker.com/id/1035538|https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-045 | False | 9.3 | CRITICAL | LOCAL | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 2.5 | 6.0 | Other | Unknown | 64.0 | MEDIUM | microsoft/windows_10 | False | Unknown | nan |
CVE-2016-1034 | The Sync Process in the JavaScript API for Creative Cloud Libraries in Adobe Creative Cloud Desktop Application before 3.6.0.244 allows remote attackers to read or write to arbitrary files via unspecified vectors. | 2016-04-12 | 2026-05-06 | UNKNOWN | adobe/creative_cloud:* | http://www.zerodayinitiative.com/advisories/ZDI-16-235|https://helpx.adobe.com/security/products/creative-cloud/apsb16-11.html|http://www.zerodayinitiative.com/advisories/ZDI-16-235|https://helpx.adobe.com/security/products/creative-cloud/apsb16-11.html | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Unknown | Unknown | 80.0 | HIGH | adobe/creative_cloud | False | Unknown | nan |
CVE-2014-9766 | Integer overflow in the create_bits function in pixman-bits-image.c in Pixman before 0.32.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via large height and stride values. | 2016-04-13 | 2026-05-06 | CWE-189 | pixman/pixman:*|canonical/ubuntu_linux:12.04|canonical/ubuntu_linux:14.04 | http://www.debian.org/security/2016/dsa-3525|http://www.openwall.com/lists/oss-security/2016/02/24/13|http://www.openwall.com/lists/oss-security/2016/02/24/15|http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html|http://www.ubuntu.com/usn/USN-2918-1 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | pixman/pixman | False | Unknown | nan |
CVE-2016-4007 | Multiple unspecified vulnerabilities in the obs-service-extract_file package before 0.3-5.1 in openSUSE Leap 42.1 and before 0.3-3.1 in openSUSE 13.2 allow attackers to execute arbitrary commands via a service definition, related to executing unzip with "illegal options." | 2016-04-13 | 2026-05-06 | UNKNOWN | opensuse/leap:42.1|opensuse/opensuse:13.2 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00046.html|http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00049.html|http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00050.html|http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00019.html|https://build.opensu... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | opensuse/leap | False | Unknown | nan |
CVE-2015-7545 | The (1) git-remote-ext and (2) unspecified other remote helper programs in Git before 2.3.10, 2.4.x before 2.4.10, 2.5.x before 2.5.4, and 2.6.x before 2.6.1 do not properly restrict the allowed protocols, which might allow remote attackers to execute arbitrary code via a URL in a (a) .gitmodules file or (b) unknown ot... | 2016-04-13 | 2026-05-06 | CWE-20|CWE-284 | git_project/git:*|git_project/git:2.4.0|git_project/git:2.4.1|git_project/git:2.4.2|git_project/git:2.4.3|git_project/git:2.4.4|git_project/git:2.4.5|git_project/git:2.4.6|git_project/git:2.4.7|git_project/git:2.4.8 | http://lists.opensuse.org/opensuse-updates/2015-11/msg00066.html|http://rhn.redhat.com/errata/RHSA-2015-2515.html|http://www.debian.org/security/2016/dsa-3435|http://www.openwall.com/lists/oss-security/2015/12/08/5|http://www.openwall.com/lists/oss-security/2015/12/09/8 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | git_project/git | False | Unknown | nan |
CVE-2016-2054 | Multiple buffer overflows in xymond/xymond.c in xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a long filename, involving handling a "config" command. | 2016-04-13 | 2026-05-06 | CWE-119 | debian/debian_linux:8.0|xymon/xymon:4.1.0|xymon/xymon:4.1.1|xymon/xymon:4.1.2|xymon/xymon:4.1.2|xymon/xymon:4.1.2|xymon/xymon:4.2|xymon/xymon:4.2|xymon/xymon:4.2|xymon/xymon:4.2.0 | http://lists.xymon.com/archive/2016-February/042986.html|http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html|http://www.debian.org/security/2016/dsa-3495|http://www.securityfocus.com/archive/1/537522/100/0/threaded|https://sourceforge.net/p/xymon/code/7859/ | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | debian/debian_linux | False | Unknown | nan |
CVE-2016-4009 | Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow. | 2016-04-13 | 2026-05-06 | CWE-119 | python/pillow:* | http://www.securityfocus.com/bid/86064|https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst|https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e|https://github.com/python-pillow/Pillow/pull/1714|https://security.gentoo.org/glsa/201612-52 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | python/pillow | False | Unknown | nan |
CVE-2016-1352 | Cisco Unified Computing System (UCS) Central Software 1.3(1b) and earlier allows remote attackers to execute arbitrary OS commands via a crafted HTTP request, aka Bug ID CSCuv33856. | 2016-04-14 | 2026-05-06 | CWE-78 | cisco/unified_computing_system_central_software:1.3\(0.1\) | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160413-ucs|http://www.securitytracker.com/id/1035565|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160413-ucs|http://www.securitytracker.com/id/1035565 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | OS Command Injection | Execution | 83.5 | HIGH | cisco/unified_computing_system_central_software | False | Unknown | nan |
CVE-2010-5325 | Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title. | 2016-04-15 | 2026-05-06 | CWE-119 | redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_hpc_node:6.0|redhat/enterprise_linux_server:6.0|redhat/enterprise_linux_server_eus:6.7.z|redhat/enterprise_linux_workstation:6.0|linuxfoundation/foomatic-filters:*|oracle/linux:6|redhat/enterprise_linux:6.0 | http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog|http://rhn.redhat.com/errata/RHSA-2016-0491.html|http://www.openwall.com/lists/oss-security/2016/02/15/1|http://www.openwall.com/lists/oss-security/2016/02/15/7|http://www.oracle.com/technetwork/topics/security... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | redhat/enterprise_linux_desktop | False | Unknown | nan |
CVE-2016-0889 | An HTTP servlet in vApp Manager in EMC Unisphere for VMAX Virtual Appliance before 8.2.0 allows remote attackers to write to arbitrary files via a crafted pathname. | 2016-04-15 | 2026-05-06 | CWE-20 | dell/emc_unisphere:* | http://seclists.org/bugtraq/2016/Apr/83|http://www.securitytracker.com/id/1035580|http://seclists.org/bugtraq/2016/Apr/83|http://www.securitytracker.com/id/1035580 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | dell/emc_unisphere | False | Unknown | nan |
CVE-2016-0835 | decoder/impeg2d_dec_hdr.c in mediaserver in Android 6.x before 2016-04-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file that triggers a certain negative value, aka internal bug 26070014. | 2016-04-18 | 2026-05-06 | CWE-119 | google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/external/libmpeg2/+/58a6822d7140137ce957c6d2fc20bae1374186c1|https://android.googlesource.com/platform/external/libmpeg2/+/ba604d336b40fd4bde1622f64d67135bdbd61301|http://source.android.com/security/bulletin/2016-04-02... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-0837 | MPEG4Extractor.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via a crafted media file, aka internal bug 27208621... | 2016-04-18 | 2026-05-06 | CWE-119 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/av/+/7a282fb64fef25349e9d341f102d9cea3bf75baf|http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/av/+/7a282fb64fef25349e9d341f102d9cea3bf75baf | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-0838 | Sonivox in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 does not check for a negative number of samples, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to arm-wt-22k/... | 2016-04-18 | 2026-05-06 | CWE-119 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/external/sonivox/+/24d7c408c52143bce7b49de82f3913fd8d1219cf|https://android.googlesource.com/platform/external/sonivox/+/3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49|http://source.android.com/security/bulletin/2016-04-02.h... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-0839 | post_proc/volume_listener.c in mediaserver in Android 6.x before 2016-04-01 mishandles deleted effect context, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 25753245. | 2016-04-18 | 2026-05-06 | CWE-119 | google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/hardware/qcom/audio/+/ebbb82365172337c6c250c6cac4e326970a9e351|http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/hardware/qcom/audio/+/ebbb82365172337c6c250c6cac4e326... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-0841 | media/libmedia/mediametadataretriever.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 mishandles cleared service binders, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, a... | 2016-04-18 | 2026-05-06 | CWE-119 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/av/+/3097f364237fb552871f7639d37a7afa4563e252|http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/av/+/3097f364237fb552871f7639d37a7afa4563e252 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-1503 | dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka... | 2016-04-18 | 2026-05-06 | CWE-119 | dhcpcd_project/dhcpcd:*|google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1 | http://roy.marples.name/projects/dhcpcd/info/76a1609352263bd9def1300d7ba990679571fa30|http://source.android.com/security/bulletin/2016-04-02.html|http://www.securitytracker.com/id/1034601|https://android.googlesource.com/platform/external/dhcpcd/+/1390ace71179f04a09c300ee8d0300aa69d9db09|https://h20566.www2.hp.com/port... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | dhcpcd_project/dhcpcd | False | Unknown | nan |
CVE-2016-2416 | libs/gui/BufferQueueConsumer.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 does not check for the android.permission.DUMP permission, which allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, v... | 2016-04-18 | 2026-05-06 | CWE-264 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/native/+/85d253fab5e2c01bd90990667c6de25c282fc5cd|https://android.googlesource.com/platform/frameworks/native/+/a40b30f5c43726120bfe69d41ff5aeb31fe1d02a|http://source.android.com/security/bulletin/2016-04-02... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-2417 | media/libmedia/IOMX.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 does not initialize a parameter data structure, which allows attackers to obtain sensitive information from process memory, and consequently bypass an unspecified protection mechanism, v... | 2016-04-18 | 2026-05-06 | CWE-264 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/av/+/1171e7c047bf79e7c93342bb6a812c9edd86aa84|https://www.exploit-db.com/exploits/39685/|http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/av/+/... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-2418 | media/libmedia/IOMX.cpp in mediaserver in Android 6.x before 2016-04-01 does not initialize certain metadata buffer pointers, which allows attackers to obtain sensitive information from process memory, and consequently bypass an unspecified protection mechanism, via unspecified vectors, as demonstrated by obtaining Sig... | 2016-04-18 | 2026-05-06 | CWE-119 | google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/av/+/8d87321b704cb3f88e8cae668937d001fd63d5e3|http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/av/+/8d87321b704cb3f88e8cae668937d001fd63d5e3 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-2419 | media/libmedia/IDrm.cpp in mediaserver in Android 6.x before 2016-04-01 does not initialize a certain key-request data structure, which allows attackers to obtain sensitive information from process memory, and consequently bypass an unspecified protection mechanism, via unspecified vectors, as demonstrated by obtaining... | 2016-04-18 | 2026-05-06 | CWE-264 | google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/av/+/5a856f2092f7086aa0fea9ae06b9255befcdcd34|http://source.android.com/security/bulletin/2016-04-02.html|https://android.googlesource.com/platform/frameworks/av/+/5a856f2092f7086aa0fea9ae06b9255befcdcd34 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-1659 | Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | 2016-04-18 | 2026-05-06 | UNKNOWN | debian/debian_linux:8.0|opensuse/leap:42.1|suse/linux_enterprise:12.0|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|canonical/ubuntu_linux:16.04|google/chrome:* | http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html|http://lists.ope... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | debian/debian_linux | False | Unknown | nan |
CVE-2014-9761 | Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function. | 2016-04-19 | 2026-05-06 | CWE-119 | suse/linux_enterprise_debuginfo:11.0|suse/linux_enterprise_debuginfo:11.0|suse/linux_enterprise_debuginfo:11.0|opensuse/opensuse:13.2|suse/linux_enterprise_desktop:11.0|suse/linux_enterprise_desktop:11.0|suse/linux_enterprise_desktop:12|suse/linux_enterprise_desktop:12|suse/linux_enterprise_server:11.0|suse/linux_enter... | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html|http://lists.ope... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | suse/linux_enterprise_debuginfo | False | Unknown | nan |
CVE-2015-8776 | The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value. | 2016-04-19 | 2026-05-06 | CWE-189 | suse/linux_enterprise_debuginfo:11|suse/linux_enterprise_debuginfo:11|suse/linux_enterprise_debuginfo:11|opensuse/opensuse:13.2|suse/linux_enterprise_desktop:11|suse/linux_enterprise_desktop:11|suse/linux_enterprise_desktop:12|suse/linux_enterprise_desktop:12|suse/linux_enterprise_server:11|suse/linux_enterprise_server... | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html|http://lists.ope... | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | Other | Unknown | 95.0 | CRITICAL | suse/linux_enterprise_debuginfo | False | Unknown | nan |
CVE-2015-8778 | Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access. | 2016-04-19 | 2026-05-06 | CWE-119 | fedoraproject/fedora:23|debian/debian_linux:8.0|canonical/ubuntu_linux:12.04|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|gnu/glibc:*|suse/linux_enterprise_debuginfo:11|suse/linux_enterprise_debuginfo:11|suse/linux_enterprise_debuginfo:11|opensuse/opensuse:13.2 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html|http://lists.ope... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | fedoraproject/fedora | False | Unknown | nan |
CVE-2015-8779 | Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name. | 2016-04-19 | 2026-05-06 | CWE-119 | suse/linux_enterprise_debuginfo:11|suse/linux_enterprise_debuginfo:11|suse/linux_enterprise_debuginfo:11|opensuse/opensuse:13.2|suse/linux_enterprise_desktop:11|suse/linux_enterprise_desktop:11|suse/linux_enterprise_desktop:12|suse/linux_enterprise_desktop:12|suse/linux_enterprise_server:11|suse/linux_enterprise_server... | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html|http://lists.ope... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | suse/linux_enterprise_debuginfo | False | Unknown | nan |
CVE-2016-2002 | The validateAdminConfig handler in the Analytics Management Console in HPE Vertica 7.0.x before 7.0.2.12, 7.1.x before 7.1.2-12, and 7.2.x before 7.2.2-1 allows remote attackers to execute arbitrary commands via the mcPort parameter, aka ZDI-CAN-3417. | 2016-04-20 | 2026-05-06 | CWE-77 | opentext/vertica:*|opentext/vertica:*|opentext/vertica:* | http://zerodayinitiative.com/advisories/ZDI-16-244/|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085303|http://zerodayinitiative.com/advisories/ZDI-16-244/|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085303 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Command Injection | Execution | 83.5 | HIGH | opentext/vertica | False | Unknown | nan |
CVE-2016-2003 | HPE P9000 Command View Advanced Edition Software (CVAE) 7.x and 8.x before 8.4.0-00 and XP7 CVAE 7.x and 8.x before 8.4.0-00 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library. | 2016-04-20 | 2026-05-06 | UNKNOWN | hp/p9000_command_view_advanced_edition_software:-|hp/xp7_command_view_advanced_edition_suite:- | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085438|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085438 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | hp/p9000_command_view_advanced_edition_software | False | Unknown | nan |
CVE-2016-0638 | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6, 12.1.2, 12.1.3, and 12.2.1 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Java Messaging Service. | 2016-04-21 | 2026-05-06 | UNKNOWN | oracle/weblogic_server:10.3.6.0.0|oracle/weblogic_server:12.1.2.0.0|oracle/weblogic_server:12.1.3.0.0|oracle/weblogic_server:12.2.1.0.0 | http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securitytracker.com/id/1035615|https://www.tenable.com/security/research/tra-2016-09|http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securitytracker.com/id/1035615 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | oracle/weblogic_server | False | Unknown | nan |
CVE-2016-0639 | Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Pluggable Authentication. | 2016-04-21 | 2026-05-06 | UNKNOWN | redhat/enterprise_linux:6.0|redhat/enterprise_linux:7.0|oracle/mysql:*|oracle/mysql:* | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html|http://rhn.redhat.com/errata/RHSA-2016-0705.html|http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securityfocus.com/bid/86418|http://www.securitytracker.com/id/1035606 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | redhat/enterprise_linux | False | Unknown | nan |
CVE-2016-0686 | Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization. | 2016-04-21 | 2026-05-06 | UNKNOWN | oracle/jdk:1.6.0|oracle/jdk:1.7.0|oracle/jdk:1.8.0|oracle/jre:1.6.0|oracle/jre:1.7.0|oracle/jre:1.8.0 | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html|http://lists.opensus... | False | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Unknown | Unknown | 77.0 | HIGH | oracle/jdk | False | Unknown | nan |
CVE-2016-0687 | Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component. | 2016-04-21 | 2026-05-06 | UNKNOWN | oracle/jdk:1.6.0|oracle/jdk:1.7.0|oracle/jdk:1.8.0|oracle/jre:1.6.0|oracle/jre:1.7.0|oracle/jre:1.8.0 | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html|http://lists.opensus... | False | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Unknown | Unknown | 77.0 | HIGH | oracle/jdk | False | Unknown | nan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.