cve_id stringlengths 13 16 ⌀ | description stringlengths 34 2.67k ⌀ | published_date stringdate 1999-03-01 00:00:00 2018-08-06 00:00:00 ⌀ | last_modified stringdate 2024-11-21 00:00:00 2026-05-06 00:00:00 ⌀ | cwe_ids stringclasses 347
values | affected_products stringlengths 7 639 ⌀ | reference_urls stringlengths 49 643 ⌀ | exploit_available stringclasses 2
values | cvss_score stringclasses 35
values | cvss_severity stringclasses 4
values | attack_vector stringclasses 3
values | attack_complexity stringclasses 2
values | privileges_required stringclasses 3
values | user_interaction stringclasses 2
values | scope stringclasses 2
values | confidentiality_impact stringclasses 3
values | integrity_impact stringclasses 3
values | availability_impact stringclasses 3
values | exploitability_score stringclasses 12
values | impact_score stringclasses 15
values | attack_type stringclasses 33
values | likely_mitre_tactic stringclasses 7
values | risk_score stringclasses 58
values | risk_level stringclasses 4
values | primary_vendor_product stringlengths 5 107 ⌀ | in_cisa_kev stringclasses 2
values | ransomware_use stringclasses 2
values | kev_required_action stringclasses 7
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2016-1128 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1129 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-1130 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4088 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4089 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4090 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4091 | Heap-based buffer overflow in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-20... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90508|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90508|http://www.securitytracker.com/id/1035828 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4092 | Heap-based buffer overflow in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-20... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90508|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90508|http://www.securitytracker.com/id/1035828 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4093 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4094 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4096 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4097 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4098 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4099 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4100 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4101 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4102 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4103 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4104 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4105 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-05-11 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-4107 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-05-11 | 2026-05-06 | UNKNOWN | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|http://www.securityfocus.com/bid/90512|http://www.securitytracker.com/id/1035828 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2010-5326 | The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as exploited in the wild in 2013 through 2016, aka a "Detour" attack. | 2016-05-13 | 2026-04-22 | CWE-306 | sap/netweaver_application_server_java:* | http://service.sap.com/sap/support/notes/1445998|http://www.onapsis.com/research/publications/sap-security-in-depth-vol4-the-invoker-servlet-a-dangerous-detour-into-sap-java-solutions|http://www.securityfocus.com/bid/48925|http://www.securityfocus.com/bid/90533|http://www.us-cert.gov/ncas/alerts/TA16-132A | True | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | HIGH | HIGH | 3.9 | 6.0 | Missing Authentication | Initial Access | 100.0 | CRITICAL | sap/netweaver_application_server_java | True | Unknown | Apply updates per vendor instructions. |
CVE-2016-1578 | Use-after-free vulnerability in Oxide allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to responding synchronously to permission requests. | 2016-05-13 | 2026-05-06 | UNKNOWN | canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|canonical/ubuntu_linux:16.04|oxide_project/oxide:- | http://www.ubuntu.com/usn/USN-2955-1|http://www.ubuntu.com/usn/USN-2955-1 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | canonical/ubuntu_linux | False | Unknown | nan |
CVE-2016-1580 | The setup_snappy_os_mounts function in the ubuntu-core-launcher package before 1.0.27.1 improperly determines the mount point of bind mounts when using snaps, which might allow remote attackers to obtain sensitive information or gain privileges via a snap with a name starting with "ubuntu-core." | 2016-05-13 | 2026-05-06 | CWE-264 | canonical/ubuntu-core-launcher:1.0.27 | http://www.ubuntu.com/usn/USN-2956-1|https://bugs.launchpad.net/ubuntu/+source/ubuntu-core-launcher/+bug/1576699|http://www.ubuntu.com/usn/USN-2956-1|https://bugs.launchpad.net/ubuntu/+source/ubuntu-core-launcher/+bug/1576699 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | canonical/ubuntu-core-launcher | False | Unknown | nan |
CVE-2016-2099 | Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document. | 2016-05-13 | 2026-05-06 | UNKNOWN | apache/xerces-c\+\+:*|opensuse/opensuse:13.2 | http://lists.opensuse.org/opensuse-updates/2016-07/msg00016.html|http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html|http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html|http://www.debian.org/security/2016/dsa-3579|http://www.openwall.com/lists/oss-security/2016/05/09/7 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | apache/xerces-c\+\+ | False | Unknown | nan |
CVE-2016-2195 | Integer overflow in the PointGFp constructor in Botan before 1.10.11 and 1.11.x before 1.11.27 allows remote attackers to overwrite memory and possibly execute arbitrary code via a crafted ECC point, which triggers a heap-based buffer overflow. | 2016-05-13 | 2026-05-06 | CWE-119 | botan_project/botan:*|botan_project/botan:1.11.0|botan_project/botan:1.11.1|botan_project/botan:1.11.2|botan_project/botan:1.11.3|botan_project/botan:1.11.4|botan_project/botan:1.11.5|botan_project/botan:1.11.6|botan_project/botan:1.11.7|botan_project/botan:1.11.8 | http://botan.randombit.net/security.html|http://marc.info/?l=botan-devel&m=145435148602911&w=2|http://www.debian.org/security/2016/dsa-3565|https://security.gentoo.org/glsa/201612-38|http://botan.randombit.net/security.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | botan_project/botan | False | Unknown | nan |
CVE-2016-2196 | Heap-based buffer overflow in the P-521 reduction function in Botan 1.11.x before 1.11.27 allows remote attackers to cause a denial of service (memory overwrite and crash) or execute arbitrary code via unspecified vectors. | 2016-05-13 | 2026-05-06 | CWE-119 | botan_project/botan:1.11.0|botan_project/botan:1.11.1|botan_project/botan:1.11.2|botan_project/botan:1.11.3|botan_project/botan:1.11.4|botan_project/botan:1.11.5|botan_project/botan:1.11.6|botan_project/botan:1.11.7|botan_project/botan:1.11.8|botan_project/botan:1.11.9 | http://botan.randombit.net/security.html|http://marc.info/?l=botan-devel&m=145435148602911&w=2|http://botan.randombit.net/security.html|http://marc.info/?l=botan-devel&m=145435148602911&w=2 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | botan_project/botan | False | Unknown | nan |
CVE-2016-4024 | Integer overflow in imlib2 before 1.4.9 on 32-bit platforms allows remote attackers to execute arbitrary code via large dimensions in an image, which triggers an out-of-bounds heap memory write operation. | 2016-05-13 | 2026-05-06 | CWE-119 | enlightenment/imlib2:*|debian/debian_linux:7.0|debian/debian_linux:8.0|opensuse/opensuse:13.2 | http://lists.opensuse.org/opensuse-updates/2016-05/msg00076.html|http://www.debian.org/security/2016/dsa-3555|http://www.securityfocus.com/bid/86073|http://www.securitytracker.com/id/1035573|https://git.enlightenment.org/legacy/imlib2.git/commit/?id=7eba2e4c8ac0e20838947f10f29d0efe1add8227 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | enlightenment/imlib2 | False | Unknown | nan |
CVE-2016-1209 | The Ninja Forms plugin before 2.9.42.1 for WordPress allows remote attackers to conduct PHP object injection attacks via crafted serialized values in a POST request. | 2016-05-14 | 2026-05-06 | CWE-20 | ninjaforms/ninja_forms:* | http://jvn.jp/en/jp/JVN44657371/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000064|http://packetstormsecurity.com/files/137211/WordPress-Ninja-Forms-Unauthenticated-File-Upload.html|http://www.pritect.net/blog/ninja-forms-2-9-42-critical-security-vulnerabilities|http://www.rapid7.com/db/modules/exploit/unix/webapp/... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | ninjaforms/ninja_forms | False | Unknown | nan |
CVE-2016-2296 | Meteocontrol WEB'log Basic 100, Light, Pro, and Pro Unlimited does not require authentication for "post-admin" login pages, which allows remote attackers to obtain sensitive information or modify data via unspecified vectors. | 2016-05-14 | 2026-05-06 | CWE-254 | meteocontrol/web\'log_basic_100:-|meteocontrol/web\'log_light:-|meteocontrol/web\'log_pro:-|meteocontrol/web\'log_pro_unlimited:- | http://seclists.org/fulldisclosure/2016/May/52|https://ics-cert.us-cert.gov/advisories/ICSA-16-133-01|https://www.exploit-db.com/exploits/39822/|http://seclists.org/fulldisclosure/2016/May/52|https://ics-cert.us-cert.gov/advisories/ICSA-16-133-01 | True | 9.4 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | LOW | 3.9 | 5.5 | Other | Unknown | 96.5 | CRITICAL | meteocontrol/web\'log_basic_100 | False | Unknown | nan |
CVE-2016-2297 | Meteocontrol WEB'log Basic 100, Light, Pro, and Pro Unlimited allows remote attackers to execute arbitrary commands via an "access command shell-like feature." | 2016-05-14 | 2026-05-06 | UNKNOWN | meteocontrol/web\'log_basic_100:-|meteocontrol/web\'log_light:-|meteocontrol/web\'log_pro:-|meteocontrol/web\'log_pro_unlimited:- | http://seclists.org/fulldisclosure/2016/May/52|https://ics-cert.us-cert.gov/advisories/ICSA-16-133-01|http://seclists.org/fulldisclosure/2016/May/52|https://ics-cert.us-cert.gov/advisories/ICSA-16-133-01 | True | 9.4 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | LOW | 3.9 | 5.5 | Unknown | Unknown | 96.5 | CRITICAL | meteocontrol/web\'log_basic_100 | False | Unknown | nan |
CVE-2016-2298 | Meteocontrol WEB'log Basic 100, Light, Pro, and Pro Unlimited allows remote attackers to obtain sensitive cleartext information via unspecified vectors. | 2016-05-14 | 2026-05-06 | CWE-200 | meteocontrol/web\'log_basic_100:-|meteocontrol/web\'log_light:-|meteocontrol/web\'log_pro:-|meteocontrol/web\'log_pro_unlimited:- | http://seclists.org/fulldisclosure/2016/May/52|https://ics-cert.us-cert.gov/advisories/ICSA-16-133-01|http://seclists.org/fulldisclosure/2016/May/52|https://ics-cert.us-cert.gov/advisories/ICSA-16-133-01 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Information Disclosure | Collection | 98.5 | CRITICAL | meteocontrol/web\'log_basic_100 | False | Unknown | nan |
CVE-2016-4325 | Lantronix xPrintServer devices with firmware before 5.0.1-65 have hardcoded credentials, which allows remote attackers to obtain root access via unspecified vectors. | 2016-05-14 | 2026-05-06 | CWE-255 | lantronix/xprintserver_firmware:* | http://www.kb.cert.org/vuls/id/785823|http://www.kb.cert.org/vuls/id/785823 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | lantronix/xprintserver_firmware | False | Unknown | nan |
CVE-2016-1662 | extensions/renderer/gc_callback.cc in Google Chrome before 50.0.2661.94 does not prevent fallback execution once the Garbage Collection callback has started, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors. | 2016-05-14 | 2026-05-06 | UNKNOWN | google/chrome:*|redhat/enterprise_linux_desktop_supplementary:6.0|redhat/enterprise_linux_server_supplementary:6.0|redhat/enterprise_linux_server_supplementary_eus:6.7z|redhat/enterprise_linux_workstation_supplementary:6.0|opensuse/opensuse:13.1 | http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html|http://lists.ope... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-1666 | Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | 2016-05-14 | 2026-05-06 | UNKNOWN | redhat/enterprise_linux_desktop_supplementary:6.0|redhat/enterprise_linux_server_supplementary:6.0|redhat/enterprise_linux_server_supplementary_eus:6.7z|redhat/enterprise_linux_workstation_supplementary:6.0|opensuse/opensuse:13.1|google/chrome:* | http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html|http://lists.ope... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | redhat/enterprise_linux_desktop_supplementary | False | Unknown | nan |
CVE-2015-4116 | Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation. | 2016-05-16 | 2026-05-06 | UNKNOWN | opensuse/leap:42.1|php/php:*|php/php:5.6.0|php/php:5.6.1|php/php:5.6.2|php/php:5.6.3|php/php:5.6.4|php/php:5.6.5|php/php:5.6.6|php/php:5.6.7 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1|http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html|http://php.net/ChangeLog-5.php|https://bugs.php.net/bug.php?id=69737|https://www.htbridge.com/advisory/HTB23262 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | opensuse/leap | False | Unknown | nan |
CVE-2015-4599 | The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issu... | 2016-05-16 | 2026-05-06 | UNKNOWN | php/php:*|php/php:5.5.0|php/php:5.5.1|php/php:5.5.2|php/php:5.5.3|php/php:5.5.4|php/php:5.5.5|php/php:5.5.6|php/php:5.5.7|php/php:5.5.8 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=51856a76f87ecb24fe1385342be43610fb6c86e4|http://php.net/ChangeLog-5.php|http://rhn.redhat.com/errata/RHSA-2015-1135.html|http://rhn.redhat.com/errata/RHSA-2015-1218.html|http://www.openwall.com/lists/oss-security/2015/06/16/12 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2015-4600 | The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapCli... | 2016-05-16 | 2026-05-06 | UNKNOWN | redhat/enterprise_linux_desktop:7.0|redhat/enterprise_linux_hpc_node:7.0|redhat/enterprise_linux_hpc_node_eus:7.1|redhat/enterprise_linux_server:7.0|redhat/enterprise_linux_server_eus:7.1|redhat/enterprise_linux_workstation:7.0|php/php:*|php/php:5.5.0|php/php:5.5.1|php/php:5.5.2 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=0c136a2abd49298b66acb0cad504f0f972f5bfe8|http://php.net/ChangeLog-5.php|http://rhn.redhat.com/errata/RHSA-2015-1135.html|http://rhn.redhat.com/errata/RHSA-2015-1218.html|http://www.openwall.com/lists/oss-security/2015/06/16/12 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | redhat/enterprise_linux_desktop | False | Unknown | nan |
CVE-2015-4601 | PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600. | 2016-05-16 | 2026-05-06 | UNKNOWN | redhat/enterprise_linux_desktop:7.0|redhat/enterprise_linux_hpc_node:7.0|redhat/enterprise_linux_hpc_node_eus:7.1|redhat/enterprise_linux_server:7.0|redhat/enterprise_linux_server_eus:7.1|redhat/enterprise_linux_workstation:7.0|php/php:* | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=0c136a2abd49298b66acb0cad504f0f972f5bfe8|http://php.net/ChangeLog-5.php|http://rhn.redhat.com/errata/RHSA-2015-1135.html|http://rhn.redhat.com/errata/RHSA-2015-1218.html|http://www.openwall.com/lists/oss-security/2015/06/16/12 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | redhat/enterprise_linux_desktop | False | Unknown | nan |
CVE-2015-4602 | The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue. | 2016-05-16 | 2026-05-06 | UNKNOWN | redhat/enterprise_linux:6.0|redhat/enterprise_linux:7.0|php/php:*|php/php:5.5.0|php/php:5.5.1|php/php:5.5.2|php/php:5.5.3|php/php:5.5.4|php/php:5.5.5|php/php:5.5.6 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=fb83c76deec58f1fab17c350f04c9f042e5977d1|http://php.net/ChangeLog-5.php|http://rhn.redhat.com/errata/RHSA-2015-1135.html|http://rhn.redhat.com/errata/RHSA-2015-1186.html|http://rhn.redhat.com/errata/RHSA-2015-1187.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | redhat/enterprise_linux | False | Unknown | nan |
CVE-2015-4603 | The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue. | 2016-05-16 | 2026-05-06 | UNKNOWN | php/php:*|php/php:5.5.0|php/php:5.5.1|php/php:5.5.2|php/php:5.5.3|php/php:5.5.4|php/php:5.5.5|php/php:5.5.6|php/php:5.5.7|php/php:5.5.8 | http://php.net/ChangeLog-5.php|http://rhn.redhat.com/errata/RHSA-2015-1135.html|http://rhn.redhat.com/errata/RHSA-2015-1186.html|http://rhn.redhat.com/errata/RHSA-2015-1187.html|http://rhn.redhat.com/errata/RHSA-2015-1218.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2015-4642 | The escapeshellarg function in ext/standard/exec.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 on Windows allows remote attackers to execute arbitrary OS commands via a crafted string to an application that accepts command-line arguments for a call to the PHP system function. | 2016-05-16 | 2026-05-06 | CWE-78 | php/php:*|php/php:5.5.0|php/php:5.5.1|php/php:5.5.2|php/php:5.5.3|php/php:5.5.4|php/php:5.5.5|php/php:5.5.6|php/php:5.5.7|php/php:5.5.8 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=d2ac264ffea5ca2e85640b6736e0c7cd4ee9a4a9|http://openwall.com/lists/oss-security/2015/06/18/6|http://php.net/ChangeLog-5.php|http://www.securityfocus.com/bid/75290|http://www.securitytracker.com/id/1032709 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | OS Command Injection | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2015-4643 | Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix f... | 2016-05-16 | 2026-05-06 | CWE-119 | php/php:*|php/php:*|php/php:*|debian/debian_linux:7.0|debian/debian_linux:8.0|redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_desktop:7.0|redhat/enterprise_linux_server:6.0|redhat/enterprise_linux_server:7.0|redhat/enterprise_linux_server_aus:6.6 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=0765623d6991b62ffcd93ddb6be8a5203a2fa7e2|http://openwall.com/lists/oss-security/2015/06/18/6|http://php.net/ChangeLog-5.php|http://rhn.redhat.com/errata/RHSA-2015-1135.html|http://rhn.redhat.com/errata/RHSA-2015-1186.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2015-5589 | The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a craft... | 2016-05-16 | 2026-05-06 | CWE-20 | php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.1 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=bf58162ddf970f63502837f366930e44d6a992cf|http://openwall.com/lists/oss-security/2015/07/18/1|http://php.net/ChangeLog-5.php|http://www.debian.org/security/2015/dsa-3344|http://www.securityfocus.com/bid/75974 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | php/php | False | Unknown | nan |
CVE-2015-6834 | Multiple use-after-free vulnerabilities in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 allow remote attackers to execute arbitrary code via vectors related to (1) the Serializable interface, (2) the SplObjectStorage class, and (3) the SplDoublyLinkedList class, which are mishandled during unserializ... | 2016-05-16 | 2026-05-06 | UNKNOWN | php/php:*|php/php:5.5.0|php/php:5.5.1|php/php:5.5.2|php/php:5.5.3|php/php:5.5.4|php/php:5.5.5|php/php:5.5.6|php/php:5.5.7|php/php:5.5.8 | http://php.net/ChangeLog-5.php|http://www.debian.org/security/2015/dsa-3358|http://www.securityfocus.com/bid/76649|http://www.securitytracker.com/id/1033548|https://bugs.php.net/bug.php?id=70172 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | php/php | False | Unknown | nan |
CVE-2015-6835 | The session deserializer in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 mishandles multiple php_var_unserialize calls, which allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted session content. | 2016-05-16 | 2026-05-06 | UNKNOWN | php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.1 | http://php.net/ChangeLog-5.php|http://www.debian.org/security/2015/dsa-3358|http://www.securityfocus.com/bid/76734|http://www.securitytracker.com/id/1033548|https://bugs.php.net/bug.php?id=70219 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | php/php | False | Unknown | nan |
CVE-2015-8835 | The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code v... | 2016-05-16 | 2026-05-06 | UNKNOWN | php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.1 | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html|http://php.net/Chang... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | php/php | False | Unknown | nan |
CVE-2016-2554 | Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive. | 2016-05-16 | 2026-05-06 | CWE-119 | php/php:7.0.0|php/php:7.0.1|php/php:7.0.2|php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html|http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-2077 | VMware Workstation 11.x before 11.1.3 and VMware Player 7.x before 7.1.3 on Windows incorrectly access an executable file, which allows host OS users to gain host OS privileges via unspecified vectors. | 2016-05-18 | 2026-05-06 | CWE-264 | vmware/player:7.0|vmware/player:7.1|vmware/player:7.1.1|vmware/player:7.1.2|vmware/workstation:11.0|vmware/workstation:11.1|vmware/workstation:11.1.1|vmware/workstation:11.1.2 | http://www.securitytracker.com/id/1035900|http://www.vmware.com/security/advisories/VMSA-2016-0005.html|http://www.securitytracker.com/id/1035900|http://www.vmware.com/security/advisories/VMSA-2016-0005.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | vmware/player | False | Unknown | nan |
CVE-2016-2208 | The kernel component in Symantec Anti-Virus Engine (AVE) 20151.1 before 20151.1.1.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory access violation and system crash) via a malformed PE header file. | 2016-05-19 | 2026-05-06 | CWE-399 | symantec/anti-virus_engine:* | http://www.securityfocus.com/bid/90653|http://www.securitytracker.com/id/1035903|http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20160516_00|https://bugs.chromium.org/p/project-zero/issues/detail?id=820|https://www.exploit-db.com/exploits/39835/ | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | HIGH | HIGH | 3.9 | 5.2 | Other | Unknown | 80.0 | HIGH | symantec/anti-virus_engine | False | Unknown | nan |
CVE-2016-4071 | Format string vulnerability in the php_snmp_error function in ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via format string specifiers in an SNMP::get call. | 2016-05-20 | 2026-05-06 | CWE-20 | php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.1 | http://lists.apple.com/archives/security-announce/2016/May/msg00004.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html|http://rhn.redhat.com/... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-4072 | The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c. | 2016-05-20 | 2026-05-06 | CWE-20 | php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.1 | http://lists.apple.com/archives/security-announce/2016/May/msg00004.html|http://rhn.redhat.com/errata/RHSA-2016-2750.html|http://www.debian.org/security/2016/dsa-3560|http://www.openwall.com/lists/oss-security/2016/04/24/1|http://www.php.net/ChangeLog-5.php | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | php/php | False | Unknown | nan |
CVE-2016-4073 | Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call. | 2016-05-20 | 2026-05-06 | CWE-119 | php/php:5.5.0|php/php:5.5.0|php/php:5.5.0|php/php:5.5.0|php/php:5.5.0|php/php:5.5.0|php/php:5.5.0|php/php:5.5.0|php/php:5.5.0|php/php:5.5.0 | http://lists.apple.com/archives/security-announce/2016/May/msg00004.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html|http://rhn.redhat.com/... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2015-8866 | ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related ... | 2016-05-22 | 2026-05-06 | CWE-611 | php/php:*|php/php:*|php/php:*|php/php:*|php/php:*|canonical/ubuntu_linux:12.04|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|opensuse/leap:42.1|opensuse/opensuse:13.2 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=de31324c221c1791b26350ba106cc26bad23ace9|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html|http:... | True | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | XML External Entity (XXE) | Initial Access | 92.0 | CRITICAL | php/php | False | Unknown | nan |
CVE-2015-8876 | Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not validate certain Exception objects, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data. | 2016-05-22 | 2026-05-06 | UNKNOWN | php/php:*|php/php:*|php/php:* | http://rhn.redhat.com/errata/RHSA-2016-2750.html|http://www.php.net/ChangeLog-5.php|https://bugs.php.net/bug.php?id=70121|http://rhn.redhat.com/errata/RHSA-2016-2750.html|http://www.php.net/ChangeLog-5.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2015-8880 | Double free vulnerability in the format printer in PHP 7.x before 7.0.1 allows remote attackers to have an unspecified impact by triggering an error. | 2016-05-22 | 2026-05-06 | CWE-415 | php/php:7.0.0 | http://php.net/ChangeLog-7.php|http://php.net/ChangeLog-7.php | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | php/php | False | Unknown | nan |
CVE-2016-4344 | Integer overflow in the xml_utf8_encode function in ext/xml/xml.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long argument to the utf8_encode function, leading to a heap-based buffer overflow. | 2016-05-22 | 2026-05-06 | CWE-190 | php/php:* | http://php.net/ChangeLog-7.php|http://www.openwall.com/lists/oss-security/2016/04/28/2|https://bugs.php.net/bug.php?id=71637|http://php.net/ChangeLog-7.php|http://www.openwall.com/lists/oss-security/2016/04/28/2 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-4345 | Integer overflow in the php_filter_encode_url function in ext/filter/sanitizing_filters.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow. | 2016-05-22 | 2026-05-06 | CWE-190 | php/php:* | http://php.net/ChangeLog-7.php|http://www.openwall.com/lists/oss-security/2016/04/28/2|https://bugs.php.net/bug.php?id=71637|http://php.net/ChangeLog-7.php|http://www.openwall.com/lists/oss-security/2016/04/28/2 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-4346 | Integer overflow in the str_pad function in ext/standard/string.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow. | 2016-05-22 | 2026-05-06 | CWE-190 | php/php:*|opensuse/leap:42.1|opensuse/opensuse:13.2 | http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html|http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html|http://php.net/ChangeLog-7.php|http://www.openwall.com/lists/oss-security/2016/04/28/2|https://bugs.php.net/bug.php?id=71637 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-4537 | The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call. | 2016-05-22 | 2026-05-06 | CWE-20 | php/php:*|php/php:5.6.0|php/php:5.6.1|php/php:5.6.2|php/php:5.6.3|php/php:5.6.4|php/php:5.6.5|php/php:5.6.6|php/php:5.6.7|php/php:5.6.8 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html|http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html|http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-4538 | The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecifie... | 2016-05-22 | 2026-05-06 | CWE-20 | php/php:*|php/php:5.6.0|php/php:5.6.1|php/php:5.6.2|php/php:5.6.3|php/php:5.6.4|php/php:5.6.5|php/php:5.6.6|php/php:5.6.7|php/php:5.6.8 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html|http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html|http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-4539 | The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser l... | 2016-05-22 | 2026-05-06 | CWE-119 | php/php:*|php/php:5.6.0|php/php:5.6.1|php/php:5.6.2|php/php:5.6.3|php/php:5.6.4|php/php:5.6.5|php/php:5.6.6|php/php:5.6.7|php/php:5.6.8 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html|http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html|http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-4540 | The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset. | 2016-05-22 | 2026-05-06 | UNKNOWN | fedoraproject/fedora:24|opensuse/leap:42.1|php/php:*|php/php:5.6.0|php/php:5.6.1|php/php:5.6.2|php/php:5.6.3|php/php:5.6.4|php/php:5.6.5|php/php:5.6.6 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html|http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html|http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | fedoraproject/fedora | False | Unknown | nan |
CVE-2016-4541 | The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset. | 2016-05-22 | 2026-05-06 | UNKNOWN | fedoraproject/fedora:24|php/php:*|php/php:5.6.0|php/php:5.6.1|php/php:5.6.2|php/php:5.6.3|php/php:5.6.4|php/php:5.6.5|php/php:5.6.6|php/php:5.6.7 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html|http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html|http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | fedoraproject/fedora | False | Unknown | nan |
CVE-2016-4542 | The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly construct spprintf arguments, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data. | 2016-05-22 | 2026-05-06 | CWE-119 | php/php:*|php/php:5.6.0|php/php:5.6.1|php/php:5.6.2|php/php:5.6.3|php/php:5.6.4|php/php:5.6.5|php/php:5.6.6|php/php:5.6.7|php/php:5.6.8 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html|http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html|http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-4543 | The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data. | 2016-05-22 | 2026-05-06 | CWE-119 | hp/system_management_homepage:*|php/php:*|php/php:5.6.0|php/php:5.6.1|php/php:5.6.2|php/php:5.6.3|php/php:5.6.4|php/php:5.6.5|php/php:5.6.6|php/php:5.6.7 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html|http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html|http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | hp/system_management_homepage | False | Unknown | nan |
CVE-2016-4544 | The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate TIFF start data, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data. | 2016-05-22 | 2026-05-06 | CWE-119 | php/php:*|php/php:*|php/php:*|opensuse/leap:42.1|opensuse/opensuse:13.2|fedoraproject/fedora:24|debian/debian_linux:8.0 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html|http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html|http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-4576 | Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitra... | 2016-05-23 | 2026-05-06 | CWE-119 | huawei/nip6300_firmware:v500r001c00|huawei/secospace_usg6500_firmware:v500r001c00|huawei/secospace_antiddos8000_firmware:v500r001c00|huawei/usg9500_firmware:v500r001c00|huawei/secospace_usg6300_firmware:v500r001c00|huawei/ngfw_module_firmware:v500r001c00|huawei/secospace_usg6600_firmware:v500r001c00|huawei/nip6600_firm... | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en|http://www.securityfocus.com/bid/90530|http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en|http://www.securityfocus.com/bid/90530 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | huawei/nip6300_firmware | False | Unknown | nan |
CVE-2016-4787 | Pulse Connect Secure (PCS) 8.2 before 8.2r1, 8.1 before 8.1r2, 8.0 before 8.0r10, and 7.4 before 7.4r13.4 allow remote attackers to read sensitive system authentication files in an unspecified directory via unknown vectors. | 2016-05-26 | 2026-05-06 | UNKNOWN | ivanti/connect_secure:8.0|ivanti/connect_secure:8.2|pulsesecure/pulse_connect_secure:7.4|ivanti/connect_secure:8.1|pulsesecure/pulse_connect_secure:8.1r1.0 | http://www.securitytracker.com/id/1035932|https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40207|http://www.securitytracker.com/id/1035932|https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40207 | False | 10.0 | CRITICAL | NETWORK | LOW | NONE | NONE | CHANGED | HIGH | NONE | HIGH | 3.9 | 5.8 | Unknown | Unknown | 84.5 | HIGH | ivanti/connect_secure | False | Unknown | nan |
CVE-2016-0718 | Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. | 2016-05-26 | 2026-05-06 | CWE-119 | mozilla/firefox:*|apple/mac_os_x:*|suse/linux_enterprise_debuginfo:11|suse/studio_onsite:1.3|suse/linux_enterprise_server:11|suse/linux_enterprise_software_development_kit:11|opensuse/leap:42.1|suse/linux_enterprise_desktop:12|suse/linux_enterprise_desktop:12|suse/linux_enterprise_server:12 | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html|http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html|http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html|http://lists.opensuse.... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | mozilla/firefox | False | Unknown | nan |
CVE-2016-1999 | The server in HP Release Control 9.13, 9.20, and 9.21 allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library. | 2016-05-30 | 2026-05-06 | CWE-284 | hp/release_control:9.13|hp/release_control:9.20|hp/release_control:9.21 | http://www.securityfocus.com/bid/90778|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05063986|http://www.securityfocus.com/bid/90778|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05063986 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | hp/release_control | False | Unknown | nan |
CVE-2016-4501 | Environmental Systems Corporation (ESC) 8832 Data Controller 3.02 and earlier mishandles sessions, which allows remote attackers to bypass authentication and make arbitrary configuration changes via unspecified vectors. | 2016-05-31 | 2026-05-06 | CWE-284 | envirosys/esc_8832_data_controller:* | https://ics-cert.us-cert.gov/advisories/ICSA-16-147-01|https://ics-cert.us-cert.gov/advisories/ICSA-16-147-01 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Other | Unknown | 95.0 | CRITICAL | envirosys/esc_8832_data_controller | False | Unknown | nan |
CVE-2016-4521 | Sixnet BT-5xxx and BT-6xxx M2M devices before 3.8.21 and 3.9.x before 3.9.8 have hardcoded credentials, which allows remote attackers to obtain access via unspecified vectors. | 2016-05-31 | 2026-05-06 | CWE-200 | sixnet/bt-5_series_cellular_router_firmware:*|sixnet/bt-5_series_cellular_router_firmware:*|sixnet/bt-6_series_cellular_router_firmware:*|sixnet/bt-6_series_cellular_router_firmware:* | https://ics-cert.us-cert.gov/advisories/ICSA-16-147-02|https://ics-cert.us-cert.gov/advisories/ICSA-16-147-02 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Information Disclosure | Collection | 98.5 | CRITICAL | sixnet/bt-5_series_cellular_router_firmware | False | Unknown | nan |
CVE-2016-3088 | The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. | 2016-06-01 | 2026-04-21 | CWE-434|CWE-434 | apache/activemq:* | http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt|http://rhn.redhat.com/errata/RHSA-2016-2036.html|http://www.securitytracker.com/id/1035951|http://www.zerodayinitiative.com/advisories/ZDI-16-356|http://www.zerodayinitiative.com/advisories/ZDI-16-357 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unrestricted File Upload | Initial Access | 100.0 | CRITICAL | apache/activemq | True | Unknown | Apply updates per vendor instructions. |
CVE-2016-4432 | The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging. | 2016-06-01 | 2026-05-06 | CWE-287 | apache/qpid_broker-j:* | http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E|http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html|http://www.securityfocus.com/archive/1/538508/100/0/threaded|http://www.securi... | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Improper Authentication | Initial Access | 95.0 | CRITICAL | apache/qpid_broker-j | False | Unknown | nan |
CVE-2016-1388 | Cisco Prime Network Analysis Module (NAM) before 6.1(1) patch.6.1-2-final and 6.2.x before 6.2(1) and Prime Virtual Network Analysis Module (vNAM) before 6.1(1) patch.6.1-2-final and 6.2.x before 6.2(1) allow remote attackers to execute arbitrary OS commands via a crafted HTTP request, aka Bug ID CSCuy21882. | 2016-06-03 | 2026-05-06 | CWE-77 | cisco/network_analysis_module:*|cisco/prime_network_analysis_module_software:5.0.0|cisco/prime_network_analysis_module_software:5.0.1|cisco/prime_network_analysis_module_software:5.0.2|cisco/prime_network_analysis_module_software:5.1.0|cisco/prime_network_analysis_module_software:5.1.2|cisco/prime_network_analysis_modu... | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime|http://www.securitytracker.com/id/1036013|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime|http://www.securitytracker.com/id/1036013 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Command Injection | Execution | 83.5 | HIGH | cisco/network_analysis_module | False | Unknown | nan |
CVE-2016-4564 | The DrawImage function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 makes an incorrect function call in attempting to locate the next token, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a cra... | 2016-06-04 | 2026-05-06 | CWE-119 | imagemagick/imagemagick:*|imagemagick/imagemagick:7.0.0-0|imagemagick/imagemagick:7.0.1-0|imagemagick/imagemagick:7.0.1-1 | http://www.imagemagick.org/script/changelog.php|http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html|https://github.com/ImageMagick/ImageMagick/commit/726812fa2fa7ce16bcf58f6e115f65427a1c0950|http://www.imagemagick.org/script/changelog.php|http://www.oracle.com/technetwork/topics/security/bull... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | imagemagick/imagemagick | False | Unknown | nan |
CVE-2015-5041 | The J9 JVM in IBM SDK, Java Technology Edition 6 before SR16 FP20, 6 R1 before SR8 FP20, 7 before SR9 FP30, and 7 R1 before SR3 FP30 allows remote attackers to obtain sensitive information or inject data by invoking non-public interface methods. | 2016-06-06 | 2026-05-06 | CWE-200 | ibm/java_sdk:*|ibm/java_sdk:*|ibm/java_sdk:*|ibm/java_sdk:*|suse/linux_enterprise_server:11|suse/linux_enterprise_server:11|suse/linux_enterprise_server:12|suse/linux_enterprise_software_development_kit:11|suse/linux_enterprise_software_development_kit:12|suse/linux_enterprise_software_development_kit:12 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html|http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html|http://www-01.ibm.co... | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Information Disclosure | Collection | 95.0 | CRITICAL | ibm/java_sdk | False | Unknown | nan |
CVE-2014-9746 | The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a den... | 2016-06-07 | 2026-05-06 | CWE-20 | freetype/freetype:*|debian/debian_linux:7.0|debian/debian_linux:8.0 | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1|http://www.debian.org/security/2015/dsa-3370|http://www.openwall.com/lists/oss-security/2015/09/11/4|http://www.openwall.com/lists/oss-security/2015/09/25/4|http://www.oracle.com/technetwork/security-advisory/cpu... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | freetype/freetype | False | Unknown | nan |
CVE-2015-7695 | The PDO adapters in Zend Framework before 1.12.16 do not filer null bytes in SQL statements, which allows remote attackers to execute arbitrary SQL commands via a crafted query. | 2016-06-07 | 2026-05-06 | CWE-89 | zend/zend_framework:*|debian/debian_linux:7.0|debian/debian_linux:8.0 | http://framework.zend.com/security/advisory/ZF2015-08|http://www.debian.org/security/2015/dsa-3369|http://www.openwall.com/lists/oss-security/2015/09/30/6|http://www.openwall.com/lists/oss-security/2015/09/30/8|http://www.openwall.com/lists/oss-security/2015/10/11/3 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 83.5 | HIGH | zend/zend_framework | False | Unknown | nan |
CVE-2016-4437 | Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter. | 2016-06-07 | 2026-04-22 | CWE-321 | apache/aurora:*|apache/shiro:*|redhat/fuse:1.0|redhat/jboss_middleware_text-only_advisories:1.0 | http://packetstormsecurity.com/files/137310/Apache-Shiro-1.2.4-Information-Disclosure.html|http://packetstormsecurity.com/files/157497/Apache-Shiro-1.2.4-Remote-Code-Execution.html|http://rhn.redhat.com/errata/RHSA-2016-2035.html|http://rhn.redhat.com/errata/RHSA-2016-2036.html|http://www.securityfocus.com/archive/1/53... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 100.0 | CRITICAL | apache/aurora | True | Unknown | Apply updates per vendor instructions. |
CVE-2016-3087 | Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin. | 2016-06-07 | 2026-05-06 | CWE-20 | apache/struts:2.3.20|apache/struts:2.3.20.1|apache/struts:2.3.24|apache/struts:2.3.24.1|apache/struts:2.3.28 | http://struts.apache.org/docs/s2-033.html|http://www-01.ibm.com/support/docview.wss?uid=swg21987854|http://www.securityfocus.com/bid/90960|http://www.securitytracker.com/id/1036017|https://www.exploit-db.com/exploits/39919/ | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | apache/struts | False | Unknown | nan |
CVE-2016-2018 | HPE Systems Insight Manager (SIM) before 7.5.1 allows remote attackers to obtain sensitive information or modify data via unspecified vectors. | 2016-06-08 | 2026-05-06 | UNKNOWN | hp/systems_insight_manager:*|hp/matrix_operating_environment:* | https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05131085|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380|https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c0... | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Unknown | Unknown | 80.0 | HIGH | hp/systems_insight_manager | False | Unknown | nan |
CVE-2016-2024 | HPE Insight Control before 7.5.1 allow remote attackers to obtain sensitive information, modify data, or cause a denial of service via unspecified vectors. | 2016-06-08 | 2026-05-06 | UNKNOWN | hp/insight_contol:*|hp/server_migration_package:* | https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05158380|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958|https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05158380|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c0... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | hp/insight_contol | False | Unknown | nan |
CVE-2016-2029 | HPE Matrix Operating Environment before 7.5.1 allows remote attackers to obtain sensitive information or modify data via unspecified vectors, a different vulnerability than CVE-2016-4358. | 2016-06-08 | 2026-05-06 | UNKNOWN | hp/systems_insight_manager:*|hp/matrix_operating_environment:* | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Unknown | Unknown | 80.0 | HIGH | hp/systems_insight_manager | False | Unknown | nan |
CVE-2016-4359 | Stack-based buffer overflow in mchan.dll in the agent in HPE LoadRunner 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.02 through patch 2, and 12.50 through patch 3 and Performance Center 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.20 through patch 2, and 12.50 throu... | 2016-06-08 | 2026-05-06 | CWE-119 | hp/loadrunner:11.52|hp/loadrunner:12.00|hp/loadrunner:12.01|hp/loadrunner:12.02|hp/loadrunner:12.50|hp/performance_center:11.52|hp/performance_center:12.00|hp/performance_center:12.01|hp/performance_center:12.20|hp/performance_center:12.50 | http://www.securityfocus.com/bid/90975|http://www.securitytracker.com/id/1036006|http://www.zerodayinitiative.com/advisories/ZDI-16-363|https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05157423|https://www.tenable.com/security/research/tra-2016-16 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | hp/loadrunner | False | Unknown | nan |
CVE-2016-4360 | web/admin/data.js in the Performance Center Virtual Table Server (VTS) component in HPE LoadRunner 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.02 through patch 2, and 12.50 through patch 3 and Performance Center 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.20 throu... | 2016-06-08 | 2026-05-06 | UNKNOWN | hp/loadrunner:11.52|hp/loadrunner:12.00|hp/loadrunner:12.01|hp/loadrunner:12.02|hp/loadrunner:12.50|hp/performance_center:11.52|hp/performance_center:12.00|hp/performance_center:12.01|hp/performance_center:12.20|hp/performance_center:12.50 | http://www.securityfocus.com/bid/90975|http://www.securitytracker.com/id/1036006|http://www.zerodayinitiative.com/advisories/ZDI-16-364|https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05157423|https://www.tenable.com/security/research/tra-2016-17 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | HIGH | HIGH | 3.9 | 5.2 | Unknown | Unknown | 95.0 | CRITICAL | hp/loadrunner | False | Unknown | nan |
CVE-2016-4366 | HPE Systems Insight Manager (SIM) before 7.5.1 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unspecified vectors. | 2016-06-08 | 2026-05-06 | UNKNOWN | hp/systems_insight_manager:* | https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05131085|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?d... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | hp/systems_insight_manager | False | Unknown | nan |
CVE-2016-4368 | HPE Universal CMDB 10.0 through 10.21, Universal CMDB Configuration Manager 10.0 through 10.21, and Universal Discovery 10.0 through 10.21 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library. | 2016-06-08 | 2026-05-06 | CWE-20 | hp/universal_cmbd_foundation:10.0|hp/universal_cmbd_foundation:10.01|hp/universal_cmbd_foundation:10.10|hp/universal_cmbd_foundation:10.11|hp/universal_cmbd_foundation:10.20|hp/universal_cmbd_foundation:10.21|hp/universal_cmbd_configuration_manager:10.0|hp/universal_cmbd_configuration_manager:10.01|hp/universal_cmbd_co... | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164408|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164408 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | hp/universal_cmbd_foundation | False | Unknown | nan |
CVE-2016-5108 | Buffer overflow in the DecodeAdpcmImaQT function in modules/codec/adpcm.c in VideoLAN VLC media player before 2.2.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted QuickTime IMA file. | 2016-06-08 | 2026-05-06 | CWE-119 | debian/debian_linux:8.0|videolan/vlc_media_player:* | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00045.html|http://www.debian.org/security/2016/dsa-3598|http://www.securityfocus.com/bid/90924|http://www.securitytracker.com/id/1036009|http://www.videolan.org/security/sa1601.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | debian/debian_linux | False | Unknown | nan |
CVE-2016-2310 | General Electric (GE) Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware before 5.5.0 and ML810, ML3000, and ML3100 switches with firmware before 5.5.0k have hardcoded credentials, which allows remote attackers to modify configuration settings via the web interface. | 2016-06-09 | 2026-05-06 | CWE-798 | ge/multilink_firmware:*|ge/multilink_firmware:* | https://ics-cert.us-cert.gov/advisories/ICSA-16-154-01|https://ics-cert.us-cert.gov/advisories/ICSA-16-154-01 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | ge/multilink_firmware | False | Unknown | nan |
CVE-2016-4510 | The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to bypass authentication and read arbitrary files via unspecified vectors. | 2016-06-09 | 2026-05-06 | CWE-287 | trihedral/vtscada:10.1.05|trihedral/vtscada:10.1.06|trihedral/vtscada:10.1.07|trihedral/vtscada:10.1.12|trihedral/vtscada:10.0.11|trihedral/vtscada:10.0.13|trihedral/vtscada:10.0.14|trihedral/vtscada:10.0.16|trihedral/vtscada:10.0.17|trihedral/vtscada:11.1.05 | http://www.securityfocus.com/bid/91077|http://www.zerodayinitiative.com/advisories/ZDI-16-404|https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01|http://www.securityfocus.com/bid/91077|http://www.zerodayinitiative.com/advisories/ZDI-16-404 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Improper Authentication | Initial Access | 95.0 | CRITICAL | trihedral/vtscada | False | Unknown | nan |
CVE-2016-4532 | Directory traversal vulnerability in the WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to read arbitrary files via a crafted pathname. | 2016-06-09 | 2026-05-06 | CWE-22 | trihedral/vtscada:10.1.05|trihedral/vtscada:10.1.06|trihedral/vtscada:10.1.07|trihedral/vtscada:10.1.12|trihedral/vtscada:9.0.02|trihedral/vtscada:9.0.03|trihedral/vtscada:9.0.08|trihedral/vtscada:9.1.02|trihedral/vtscada:9.1.03|trihedral/vtscada:9.1.05 | http://www.securityfocus.com/bid/91077|http://www.zerodayinitiative.com/advisories/ZDI-16-403|https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01|http://www.securityfocus.com/bid/91077|http://www.zerodayinitiative.com/advisories/ZDI-16-403 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Path Traversal | Defense Evasion | 95.0 | CRITICAL | trihedral/vtscada | False | Unknown | nan |
CVE-2016-0749 | The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow. | 2016-06-09 | 2026-05-06 | CWE-119 | opensuse/leap:42.1|opensuse/opensuse:13.2|debian/debian_linux:8.0|redhat/enterprise_linux:6.0|redhat/enterprise_linux:6.0|redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_server:6.0|redhat/enterprise_linux_workstation:6.0|redhat/enterprise_linux:7.0|redhat/enterprise_linux:7.0 | http://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html|http://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html|http://www.debian.org/security/2016/dsa-3596|http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html|http://www.ubuntu.com/usn/USN-3014-1 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | opensuse/leap | False | Unknown | nan |
CVE-2016-4448 | Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors. | 2016-06-09 | 2026-05-06 | CWE-134 | hp/icewall_federation_agent:3.0|apple/watchos:*|apple/mac_os_x:*|xmlsoft/libxml2:*|apple/icloud:*|apple/iphone_os:*|redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_desktop:7.0|redhat/enterprise_linux_server:6.0|redhat/enterprise_linux_server:7.0 | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html|http://lists.apple.com/archi... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | hp/icewall_federation_agent | False | Unknown | nan |
CVE-2016-0916 | EMC NetWorker 8.2.1.x and 8.2.2.x before 8.2.2.6 and 9.x before 9.0.0.6 mishandles authentication, which allows remote attackers to execute arbitrary commands by leveraging access to a different NetWorker instance. | 2016-06-10 | 2026-05-06 | CWE-287 | emc/networker:*|emc/networker:*|emc/networker:* | http://seclists.org/bugtraq/2016/Jun/43|http://www.securitytracker.com/id/1036075|http://seclists.org/bugtraq/2016/Jun/43|http://www.securitytracker.com/id/1036075 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 98.5 | CRITICAL | emc/networker | False | Unknown | nan |
CVE-2016-4326 | The Chef Manage (formerly opscode-manage) add-on before 1.12.0 for Chef allows remote attackers to execute arbitrary code via crafted serialized data in a cookie. | 2016-06-10 | 2026-05-06 | UNKNOWN | chef/chef_manage:* | http://www.kb.cert.org/vuls/id/586503|http://www.kb.cert.org/vuls/id/586503 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | chef/chef_manage | False | Unknown | nan |
CVE-2016-4328 | MEDHOST Perioperative Information Management System (aka PIMS or VPIMS) before 2015R1 has hardcoded credentials, which makes it easier for remote attackers to obtain sensitive information via direct requests to the application database server. | 2016-06-10 | 2026-05-06 | UNKNOWN | medhost/perioperative_information_management_system:- | http://www.kb.cert.org/vuls/id/482135|http://www.kb.cert.org/vuls/id/482135 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | medhost/perioperative_information_management_system | False | Unknown | nan |
CVE-2016-2785 | Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding. | 2016-06-10 | 2026-05-06 | CWE-284 | puppet/puppet:4.0.0|puppet/puppet:4.0.0|puppet/puppet:4.0.0|puppet/puppet:4.0.0|puppet/puppet:4.1.0|puppet/puppet:4.2.0|puppet/puppet:4.2.1|puppet/puppet:4.2.2|puppet/puppet:4.2.3|puppet/puppet:4.3.0 | https://github.com/puppetlabs/puppet/pull/4921/commits/8d2ce797db265720f0a20d1d46ee2757b4e4f6b2|https://puppet.com/security/cve/cve-2016-2785|https://security.gentoo.org/glsa/201606-02|https://github.com/puppetlabs/puppet/pull/4921/commits/8d2ce797db265720f0a20d1d46ee2757b4e4f6b2|https://puppet.com/security/cve/cve-201... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | puppet/puppet | False | Unknown | nan |
CVE-2016-2786 | The pxp-agent component in Puppet Enterprise 2015.3.x before 2015.3.3 and Puppet Agent 1.3.x before 1.3.6 does not properly validate server certificates, which might allow remote attackers to spoof brokers and execute arbitrary commands via a crafted certificate. | 2016-06-10 | 2026-05-06 | CWE-20 | puppet/puppet_agent:1.3.0|puppet/puppet_agent:1.3.1|puppet/puppet_agent:1.3.2|puppet/puppet_agent:1.3.4|puppet/puppet_agent:1.3.5|puppet/puppet_enterprise:2015.3.0|puppet/puppet_enterprise:2015.3.2 | https://puppet.com/security/cve/CVE-2016-2786|https://security.gentoo.org/glsa/201606-02|https://puppet.com/security/cve/CVE-2016-2786|https://security.gentoo.org/glsa/201606-02 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | puppet/puppet_agent | False | Unknown | nan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.