cve_id stringlengths 13 16 ⌀ | description stringlengths 34 2.67k ⌀ | published_date stringdate 1999-03-01 00:00:00 2018-08-06 00:00:00 ⌀ | last_modified stringdate 2024-11-21 00:00:00 2026-05-06 00:00:00 ⌀ | cwe_ids stringclasses 347
values | affected_products stringlengths 7 639 ⌀ | reference_urls stringlengths 49 643 ⌀ | exploit_available stringclasses 2
values | cvss_score stringclasses 35
values | cvss_severity stringclasses 4
values | attack_vector stringclasses 3
values | attack_complexity stringclasses 2
values | privileges_required stringclasses 3
values | user_interaction stringclasses 2
values | scope stringclasses 2
values | confidentiality_impact stringclasses 3
values | integrity_impact stringclasses 3
values | availability_impact stringclasses 3
values | exploitability_score stringclasses 12
values | impact_score stringclasses 15
values | attack_type stringclasses 33
values | likely_mitre_tactic stringclasses 7
values | risk_score stringclasses 58
values | risk_level stringclasses 4
values | primary_vendor_product stringlengths 5 107 ⌀ | in_cisa_kev stringclasses 2
values | ransomware_use stringclasses 2
values | kev_required_action stringclasses 7
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2016-0693 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the PAM LDAP module. | 2016-04-21 | 2026-05-06 | UNKNOWN | oracle/solaris:10|oracle/solaris:11.3 | http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securitytracker.com/id/1035629|http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securitytracker.com/id/1035629 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | oracle/solaris | False | Unknown | nan |
CVE-2016-0699 | Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 12.0.2 and 12.0.3 allows remote attackers to affect confidentiality and integrity via vectors related to the Login sub-component. | 2016-04-21 | 2026-05-06 | UNKNOWN | oracle/flexcube_direct_banking:12.0.2|oracle/flexcube_direct_banking:12.0.3 | http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securitytracker.com/id/1035604|http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securitytracker.com/id/1035604 | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Unknown | Unknown | 80.0 | HIGH | oracle/flexcube_direct_banking | False | Unknown | nan |
CVE-2016-1363 | Buffer overflow in the redirection functionality in Cisco Wireless LAN Controller (WLC) Software 7.2 through 7.4 before 7.4.140.0(MD) and 7.5 through 8.0 before 8.0.115.0(ED) allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCus25617. | 2016-04-21 | 2026-05-06 | CWE-399 | cisco/wireless_lan_controller_software:*|cisco/wireless_lan_controller_software:* | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-htrd|http://www.securitytracker.com/id/1035633|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-htrd|http://www.securitytracker.com/id/1035633 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | cisco/wireless_lan_controller_software | False | Unknown | nan |
CVE-2016-2004 | HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2623. | 2016-04-21 | 2026-05-06 | CWE-306 | hp/data_protector:*|hp/data_protector:*|hp/data_protector:* | http://packetstormsecurity.com/files/137199/HP-Data-Protector-A.09.00-Command-Execution.html|http://packetstormsecurity.com/files/137341/HP-Data-Protector-Encrypted-Communication-Remote-Command-Execution.html|http://www.kb.cert.org/vuls/id/267328|http://www.securitytracker.com/id/1035631|https://h20566.www2.hpe.com/por... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Missing Authentication | Initial Access | 98.5 | CRITICAL | hp/data_protector | False | Unknown | nan |
CVE-2016-2005 | HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-3352. | 2016-04-21 | 2026-05-06 | UNKNOWN | hp/data_protector:*|hp/data_protector:*|hp/data_protector:* | http://www.securitytracker.com/id/1035631|http://www.zerodayinitiative.com/advisories/ZDI-16-245|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988|http://www.securitytracker.com/id/1035631|http://www.zerodayinitiative.com/advisories/ZDI-16-245 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | hp/data_protector | False | Unknown | nan |
CVE-2016-2006 | HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-3353. | 2016-04-21 | 2026-05-06 | UNKNOWN | hp/data_protector:*|hp/data_protector:*|hp/data_protector:* | http://www.securitytracker.com/id/1035631|http://www.zerodayinitiative.com/advisories/ZDI-16-246|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988|http://www.securitytracker.com/id/1035631|http://www.zerodayinitiative.com/advisories/ZDI-16-246 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | hp/data_protector | False | Unknown | nan |
CVE-2016-2007 | HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-3354. | 2016-04-21 | 2026-05-06 | UNKNOWN | hp/data_protector:*|hp/data_protector:*|hp/data_protector:* | http://www.securitytracker.com/id/1035631|http://www.zerodayinitiative.com/advisories/ZDI-16-247|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988|http://www.securitytracker.com/id/1035631|http://www.zerodayinitiative.com/advisories/ZDI-16-247 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | hp/data_protector | False | Unknown | nan |
CVE-2016-2008 | HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allows remote attackers to execute arbitrary code via unspecified vectors. | 2016-04-21 | 2026-05-06 | UNKNOWN | hp/data_protector:*|hp/data_protector:*|hp/data_protector:* | http://www.securitytracker.com/id/1035631|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988|http://www.securitytracker.com/id/1035631|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | hp/data_protector | False | Unknown | nan |
CVE-2016-3427 | Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. | 2016-04-21 | 2026-04-22 | CWE-284 | oracle/jdk:1.6.0|oracle/jdk:1.7.0|oracle/jdk:1.8.0|oracle/jre:1.6.0|oracle/jre:1.7.0|oracle/jre:1.8.0|oracle/jrockit:r28.3.9|oracle/linux:5|oracle/linux:6|oracle/linux:7 | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html|http://lists.opensus... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 100.0 | CRITICAL | oracle/jdk | True | Unknown | Apply updates per vendor instructions. |
CVE-2016-3443 | Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D. NOTE: the previous information is from the April 2016 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to... | 2016-04-21 | 2026-05-06 | UNKNOWN | oracle/jdk:1.6.0|oracle/jdk:1.7.0|oracle/jdk:1.8.0|oracle/jre:1.6.0|oracle/jre:1.7.0|oracle/jre:1.8.0 | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html|http://lists.opensus... | False | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Unknown | Unknown | 77.0 | HIGH | oracle/jdk | False | Unknown | nan |
CVE-2016-3454 | Unspecified vulnerability in the Java VM component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | 2016-04-21 | 2026-05-06 | UNKNOWN | oracle/database:11.2.0.4|oracle/database:12.1.0.1|oracle/database:12.1.0.2 | http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securitytracker.com/id/1035590|http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securitytracker.com/id/1035590 | False | 9.0 | CRITICAL | NETWORK | HIGH | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 2.2 | 6.0 | Unknown | Unknown | 71.0 | HIGH | oracle/database | False | Unknown | nan |
CVE-2016-3466 | Unspecified vulnerability in the Oracle Field Service component in Oracle E-Business Suite 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect confidentiality and integrity via vectors related to Wireless. | 2016-04-21 | 2026-05-06 | UNKNOWN | oracle/field_service:12.1.1|oracle/field_service:12.1.2|oracle/field_service:12.1.3 | http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securitytracker.com/id/1035603|http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html|http://www.securitytracker.com/id/1035603 | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Unknown | Unknown | 80.0 | HIGH | oracle/field_service | False | Unknown | nan |
CVE-2016-2331 | The web interface on SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 has a default password, which makes it easier for remote attackers to obtain access via unspecified vectors. | 2016-04-25 | 2026-05-06 | CWE-255 | systech/syslink_sl-1000_modular_gateway_firmware:- | http://www.kb.cert.org/vuls/id/822980|http://www.kb.cert.org/vuls/id/822980 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | systech/syslink_sl-1000_modular_gateway_firmware | False | Unknown | nan |
CVE-2016-1601 | yast2-users before 3.1.47, as used in SUSE Linux Enterprise 12 SP1, does not properly set empty password fields in /etc/shadow during an AutoYaST installation when the profile does not contain inst-sys users, which might allow attackers to have unspecified impact via unknown vectors. | 2016-04-26 | 2026-05-06 | CWE-255 | suse/yast2:* | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00051.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00007.html|https://bugzilla.suse.com/show_bug.cgi?id=974220|https://build.opensuse.org/request/show/388020|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00051.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | suse/yast2 | False | Unknown | nan |
CVE-2016-3074 | Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow. | 2016-04-26 | 2026-05-06 | CWE-681 | libgd/libgd:2.1.1|debian/debian_linux:7.0|debian/debian_linux:8.0|fedoraproject/fedora:23|fedoraproject/fedora:24|canonical/ubuntu_linux:12.04|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|canonical/ubuntu_linux:16.04|opensuse/opensuse:13.2 | http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html|http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html|http://rhn.re... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | libgd/libgd | False | Unknown | nan |
CVE-2016-3082 | XSLTResult in Apache Struts 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1 allows remote attackers to execute arbitrary code via the stylesheet location parameter. | 2016-04-26 | 2026-05-06 | CWE-20 | apache/struts:2.0.0|apache/struts:2.0.1|apache/struts:2.0.2|apache/struts:2.0.3|apache/struts:2.0.4|apache/struts:2.0.5|apache/struts:2.0.6|apache/struts:2.0.7|apache/struts:2.0.8|apache/struts:2.0.9 | http://struts.apache.org/docs/s2-031.html|http://www.securityfocus.com/bid/88826|http://www.securitytracker.com/id/1035664|http://struts.apache.org/docs/s2-031.html|http://www.securityfocus.com/bid/88826 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | apache/struts | False | Unknown | nan |
CVE-2016-4002 | Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes. | 2016-04-26 | 2026-05-06 | CWE-120 | qemu/qemu:*|fedoraproject/fedora:22|fedoraproject/fedora:23|fedoraproject/fedora:24|canonical/ubuntu_linux:12.04|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|canonical/ubuntu_linux:16.04|debian/debian_linux:8.0 | http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html|http://www.openwall.com/lists/oss-security/2016/04/11/6|http://www.openwall.com/l... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Unknown | 98.5 | CRITICAL | qemu/qemu | False | Unknown | nan |
CVE-2015-8812 | drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets. | 2016-04-27 | 2026-05-06 | UNKNOWN | novell/suse_linux_enterprise_real_time_extension:12|linux/linux_kernel:*|linux/linux_kernel:*|linux/linux_kernel:*|linux/linux_kernel:*|linux/linux_kernel:*|linux/linux_kernel:*|linux/linux_kernel:*|linux/linux_kernel:*|canonical/ubuntu_linux:12.04 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=67f1aee6f45059fd6b0f5b0ecb2c97ad0451f6b3|http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html|http://lists.opensuse.org/opensuse-security-announce/20... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | novell/suse_linux_enterprise_real_time_extension | False | Unknown | nan |
CVE-2016-1343 | The XML parser in Cisco Information Server (CIS) 6.2 allows remote attackers to read arbitrary files or cause a denial of service (CPU and memory consumption) via an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka Bug ID CSCuy39059. | 2016-04-30 | 2026-05-06 | UNKNOWN | cisco/information_server:6.2_base | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-cis|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-cis | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | NONE | HIGH | 3.9 | 5.8 | Unknown | Unknown | 84.5 | HIGH | cisco/information_server | False | Unknown | nan |
CVE-2016-2108 | The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue. | 2016-05-05 | 2026-05-06 | CWE-119 | redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_hpc_node:6.0|redhat/enterprise_linux_server:6.0|redhat/enterprise_linux_workstation:6.0|openssl/openssl:*|openssl/openssl:1.0.2|openssl/openssl:1.0.2|openssl/openssl:1.0.2|openssl/openssl:1.0.2|openssl/openssl:1.0.2a | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759|http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html|http://lists.fedoraprojec... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | redhat/enterprise_linux_desktop | False | Unknown | nan |
CVE-2016-4351 | SQL injection vulnerability in the authentication functionality in Trend Micro Email Encryption Gateway (TMEEG) 5.5 before build 1107 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | 2016-05-05 | 2026-05-06 | CWE-89 | trendmicro/email_encryption_gateway:* | http://www.zerodayinitiative.com/advisories/ZDI-16-248|https://esupport.trendmicro.com/solution/en-US/1114060.aspx|http://www.zerodayinitiative.com/advisories/ZDI-16-248|https://esupport.trendmicro.com/solution/en-US/1114060.aspx | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | trendmicro/email_encryption_gateway | False | Unknown | nan |
CVE-2016-1387 | The XML API in TelePresence Codec (TC) 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, and 7.3.5 and Collaboration Endpoint (CE) 8.0.0, 8.0.1, and 8.1.0 in Cisco TelePresence Software mishandles authentication, which allows remote attackers to execute control commands or make configuration changes via an API request, ... | 2016-05-05 | 2026-05-06 | CWE-287 | cisco/telepresence_tc_software:7.2.0|cisco/telepresence_tc_software:7.2.1|cisco/telepresence_tc_software:7.3.0|cisco/telepresence_tc_software:7.3.1|cisco/telepresence_tc_software:7.3.2|cisco/telepresence_tc_software:7.3.3 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml|http://www.securitytracker.com/id/1035744|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml|http://www.securitytracker.com/id/1035744 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 83.5 | HIGH | cisco/telepresence_tc_software | False | Unknown | nan |
CVE-2015-0857 | Cool Projects TarDiff allows remote attackers to execute arbitrary commands via shell metacharacters in the name of a (1) tar file or (2) file within a tar file. | 2016-05-06 | 2026-05-06 | CWE-77 | tardiff_project/tardiff:-|debian/debian_linux:8.0 | http://www.debian.org/security/2016/dsa-3562|https://anonscm.debian.org/cgit/collab-maint/tardiff.git/commit/?id=9bd6a07bc204472ac27242cea16f89943b43003a|https://anonscm.debian.org/cgit/collab-maint/tardiff.git/commit/?id=a18e8df51511df276e61dbccdbe1714fc53af965|http://www.debian.org/security/2016/dsa-3562|https://anon... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Command Injection | Execution | 83.5 | HIGH | tardiff_project/tardiff | False | Unknown | nan |
CVE-2015-8863 | Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote attackers to cause a denial of service (crash) via a long JSON-encoded number, which triggers a heap-based buffer overflow. | 2016-05-06 | 2026-05-06 | CWE-119 | opensuse/leap:42.1|opensuse/opensuse:13.2|jq_project/jq:* | http://lists.opensuse.org/opensuse-updates/2016-05/msg00012.html|http://lists.opensuse.org/opensuse-updates/2016-05/msg00014.html|http://rhn.redhat.com/errata/RHSA-2016-1098.html|http://rhn.redhat.com/errata/RHSA-2016-1099.html|http://rhn.redhat.com/errata/RHSA-2016-1106.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | opensuse/leap | False | Unknown | nan |
CVE-2016-4422 | The pam_sm_authenticate function in pam_sshauth.c in libpam-sshauth might allow context-dependent attackers to bypass authentication or gain privileges via a system user account. | 2016-05-06 | 2026-05-06 | CWE-287 | libpam-sshauth_project/libpam-sshauth:-|debian/debian_linux:8.0 | http://www.debian.org/security/2016/dsa-3567|https://bazaar.launchpad.net/~ltsp-upstream/ltsp/libpam-sshauth/revision/114#src/pam_sshauth.c|http://www.debian.org/security/2016/dsa-3567|https://bazaar.launchpad.net/~ltsp-upstream/ltsp/libpam-sshauth/revision/114#src/pam_sshauth.c | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 98.5 | CRITICAL | libpam-sshauth_project/libpam-sshauth | False | Unknown | nan |
CVE-2013-7455 | Double free vulnerability in the DefaultICCintents function in cmscnvrt.c in liblcms2 in Little CMS 2.x before 2.6 allows remote attackers to execute arbitrary code via a malformed ICC profile that triggers an error in the default intent handler. | 2016-05-07 | 2026-05-06 | UNKNOWN | littlecms/little_cms_color_engine:2.0|littlecms/little_cms_color_engine:2.1|littlecms/little_cms_color_engine:2.2|littlecms/little_cms_color_engine:2.3|littlecms/little_cms_color_engine:2.4|littlecms/little_cms_color_engine:2.5 | http://www.kb.cert.org/vuls/id/369800|http://www.ubuntu.com/usn/USN-2961-1|https://github.com/mm2/Little-CMS/commit/fefaaa43c382eee632ea3ad0cfa915335140e1db|https://penteston.com/OSVDB-105462|http://www.kb.cert.org/vuls/id/369800 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | littlecms/little_cms_color_engine | False | Unknown | nan |
CVE-2015-6550 | bpcd in Veritas NetBackup 7.x through 7.5.0.7, 7.6.0.x through 7.6.0.4, 7.6.1.x through 7.6.1.2, and 7.7.x before 7.7.2 and NetBackup Appliance through 2.5.4, 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary commands via crafted input. | 2016-05-07 | 2026-05-06 | CWE-284 | veritas/netbackup_appliance:1.1.0.1|veritas/netbackup_appliance:1.1.0.2|veritas/netbackup_appliance:1.2|veritas/netbackup_appliance:2.0|veritas/netbackup_appliance:2.0.1|veritas/netbackup_appliance:2.0.2|veritas/netbackup_appliance:2.0.3|veritas/netbackup_appliance:2.5|veritas/netbackup_appliance:2.5.1|veritas/netbacku... | http://www.securitytracker.com/id/1035704|https://www.veritas.com/content/support/en_US/security/VTS16-001.html|http://www.securitytracker.com/id/1035704|https://www.veritas.com/content/support/en_US/security/VTS16-001.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | veritas/netbackup_appliance | False | Unknown | nan |
CVE-2015-6552 | The management-services protocol implementation in Veritas NetBackup 7.x through 7.5.0.7, 7.6.0.x through 7.6.0.4, 7.6.1.x through 7.6.1.2, and 7.7.x before 7.7.2 and NetBackup Appliance through 2.5.4, 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, and 2.7.x before 2.7.2 allows remote attackers to make arbitrary RPC... | 2016-05-07 | 2026-05-06 | CWE-284 | veritas/netbackup_appliance:1.1.0.1|veritas/netbackup_appliance:1.1.0.2|veritas/netbackup_appliance:1.2|veritas/netbackup_appliance:2.0|veritas/netbackup_appliance:2.0.1|veritas/netbackup_appliance:2.0.2|veritas/netbackup_appliance:2.0.3|veritas/netbackup_appliance:2.5|veritas/netbackup_appliance:2.5.1|veritas/netbacku... | http://www.securitytracker.com/id/1035704|https://www.veritas.com/content/support/en_US/security/VTS16-001.html|http://www.securitytracker.com/id/1035704|https://www.veritas.com/content/support/en_US/security/VTS16-001.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | veritas/netbackup_appliance | False | Unknown | nan |
CVE-2016-2351 | SQL injection vulnerability in home/seos/courier/security_key2.api on the Accellion File Transfer Appliance (FTA) before FTA_9_12_40 allows remote attackers to execute arbitrary SQL commands via the client_id parameter. | 2016-05-07 | 2026-05-06 | CWE-89 | accellion/file_transfer_appliance:* | http://devco.re/blog/2016/04/21/how-I-hacked-facebook-and-found-someones-backdoor-script-eng-ver/|http://www.kb.cert.org/vuls/id/505560|http://devco.re/blog/2016/04/21/how-I-hacked-facebook-and-found-someones-backdoor-script-eng-ver/|http://www.kb.cert.org/vuls/id/505560 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | accellion/file_transfer_appliance | False | Unknown | nan |
CVE-2016-2428 | libAACdec/src/aacdec_drc.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not properly limit the number of threads, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted media fil... | 2016-05-09 | 2026-05-06 | CWE-119 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-05-01.html|https://android.googlesource.com/platform/external/aac/+/5d4405f601fa11a8955fd7611532c982420e4206|http://source.android.com/security/bulletin/2016-05-01.html|https://android.googlesource.com/platform/external/aac/+/5d4405f601fa11a8955fd7611532c982420e4206 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-2429 | libFLAC/stream_decoder.c in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not prevent free operations on uninitialized memory, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted med... | 2016-05-09 | 2026-05-06 | CWE-119 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-05-01.html|https://android.googlesource.com/platform/external/flac/+/b499389da21d89d32deff500376c5ee4f8f0b04c|http://source.android.com/security/bulletin/2016-05-01.html|https://android.googlesource.com/platform/external/flac/+/b499389da21d89d32deff500376c5ee4f8f0b04c | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-4350 | Multiple SQL injection vulnerabilities in the Web Services web server in SolarWinds Storage Resource Monitor (SRM) Profiler (formerly Storage Manager (STM)) before 6.2.3 allow remote attackers to execute arbitrary SQL commands via the (1) ScriptSchedule parameter in the ScriptServlet servlet; the (2) winEventId or (3) ... | 2016-05-09 | 2026-05-06 | CWE-89 | solarwinds/storage_resource_monitor:* | http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm|http://www.zerodayinitiative.com/advisories/ZDI-16-249|http://www.zerodayinitiative.com/advisories/ZDI-16-250|http://www.zerodayinitiative.com/advisories/ZDI-16-251|http://www.zerodayinitiative.com/advisories/ZDI-16-252 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 83.5 | HIGH | solarwinds/storage_resource_monitor | False | Unknown | nan |
CVE-2016-1114 | Adobe ColdFusion 10 before Update 19, 11 before Update 8, and 2016 before Update 1 allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library. | 2016-05-11 | 2026-05-06 | CWE-502 | adobe/coldfusion:10.0|adobe/coldfusion:10.0|adobe/coldfusion:10.0|adobe/coldfusion:10.0|adobe/coldfusion:10.0|adobe/coldfusion:10.0|adobe/coldfusion:10.0|adobe/coldfusion:10.0|adobe/coldfusion:10.0|adobe/coldfusion:10.0 | http://www.securityfocus.com/bid/90506|https://helpx.adobe.com/security/products/coldfusion/apsb16-16.html|http://www.securityfocus.com/bid/90506|https://helpx.adobe.com/security/products/coldfusion/apsb16-16.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Deserialization Vulnerability | Execution | 98.5 | CRITICAL | adobe/coldfusion | False | Unknown | nan |
CVE-2016-4117 | Adobe Flash Player 21.0.0.226 and earlier allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in May 2016. | 2016-05-11 | 2026-04-21 | UNKNOWN | adobe/flash_player:*|redhat/enterprise_linux_desktop:5.0|redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_server:5.0|redhat/enterprise_linux_server:6.0|redhat/enterprise_linux_server_from_rhui:5.0|redhat/enterprise_linux_server_from_rhui:6.0|redhat/enterprise_linux_workstation:5.0|redhat/enterprise_linux_wor... | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00046.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00047.html|http://rhn.redhat.co... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 100.0 | CRITICAL | adobe/flash_player | True | Unknown | The impacted product is end-of-life and should be disconnected if still in use. |
CVE-2016-1037 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1038 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1039, ... | 2016-05-11 | 2026-05-06 | CWE-284 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90517|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-292|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90517 | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | Other | Unknown | 84.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1039 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, ... | 2016-05-11 | 2026-05-06 | CWE-284 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90517|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-290|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90517 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1040 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, ... | 2016-05-11 | 2026-05-06 | CWE-284 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90517|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90517|http://www.securitytracker.com/id/1035828 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1041 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, ... | 2016-05-11 | 2026-05-06 | CWE-284 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90517|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-288|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90517 | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | Other | Unknown | 84.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1042 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, ... | 2016-05-11 | 2026-05-06 | CWE-284 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90517|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-287|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90517 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1043 | Integer overflow in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors. | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90516|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-286|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90516 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1044 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, ... | 2016-05-11 | 2026-05-06 | CWE-284 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90517|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-291|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90517 | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | Other | Unknown | 84.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1045 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-293|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1046 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-294|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1047 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-295|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1048 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-296|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1049 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-297|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1050 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-298|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1051 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-299|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|https://lists.debian.org/debian-lts-announce/2017/11/msg00004.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1052 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-300|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1053 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-301|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1054 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-302|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1055 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-303|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1056 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-304|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1057 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-305|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1058 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-306|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1059 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-307|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1060 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-308|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1061 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-309|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1062 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, ... | 2016-05-11 | 2026-05-06 | CWE-284 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90517|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-310|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90517 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1063 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-311|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-311 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1064 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1065 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-312|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1066 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-313|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1067 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-315|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1068 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-316|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1069 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-317|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1070 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-318|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1071 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-319|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-319 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1072 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-320|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-320 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1073 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-321|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-321 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1074 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-322|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-322 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1075 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_xi:*|adobe/reader_xi:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-323|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat_dc | False | Unknown | nan |
CVE-2016-1076 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-324|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-324 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1077 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://packetstormsecurity.com/files/137035/Adobe-Reader-DC-15.010.20060-Memory-Corruption.html|http://www.securitytracker.com/id/1035828|https://0patch.blogspot.com/2016/06/writing-0patch-for-acrobat-readers-use.html|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|https://www.exploit-db.com/exploits/3... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1078 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-325|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-325 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1080 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-327|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-327 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1081 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1082 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1083 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1084 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1085 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1086 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1088 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1093 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1094 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_xi:*|adobe/reader_xi:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-328|http://www.zerodayinitiative.com/advisories/ZDI-16-359|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat_dc | False | Unknown | nan |
CVE-2016-1095 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-329|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-329 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1112 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to obtain sensitive information via unspecified vectors. | 2016-05-11 | 2026-05-06 | CWE-200 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90510|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90510|http://www.securitytracker.com/id/1035828 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Information Disclosure | Collection | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1116 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1117 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, ... | 2016-05-11 | 2026-05-06 | CWE-284 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90517|http://www.securitytracker.com/id/1035828|http://www.zerodayinitiative.com/advisories/ZDI-16-285|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90517 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1118 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1119 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1120 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1121 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_xi:*|adobe/reader_xi:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat_dc | False | Unknown | nan |
CVE-2016-1122 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1123 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1124 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1125 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1126 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1127 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.