cve_id stringlengths 13 16 ⌀ | description stringlengths 34 2.67k ⌀ | published_date stringdate 1999-03-01 00:00:00 2018-08-06 00:00:00 ⌀ | last_modified stringdate 2024-11-21 00:00:00 2026-05-06 00:00:00 ⌀ | cwe_ids stringclasses 347
values | affected_products stringlengths 7 639 ⌀ | reference_urls stringlengths 49 643 ⌀ | exploit_available stringclasses 2
values | cvss_score stringclasses 35
values | cvss_severity stringclasses 4
values | attack_vector stringclasses 3
values | attack_complexity stringclasses 2
values | privileges_required stringclasses 3
values | user_interaction stringclasses 2
values | scope stringclasses 2
values | confidentiality_impact stringclasses 3
values | integrity_impact stringclasses 3
values | availability_impact stringclasses 3
values | exploitability_score stringclasses 12
values | impact_score stringclasses 15
values | attack_type stringclasses 33
values | likely_mitre_tactic stringclasses 7
values | risk_score stringclasses 58
values | risk_level stringclasses 4
values | primary_vendor_product stringlengths 5 107 ⌀ | in_cisa_kev stringclasses 2
values | ransomware_use stringclasses 2
values | kev_required_action stringclasses 7
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2016-3720 | XML external entity (XXE) vulnerability in XmlMapper in the Data format extension for Jackson (aka jackson-dataformat-xml) allows attackers to have unspecified impact via unknown vectors. | 2016-06-10 | 2026-05-06 | UNKNOWN | fedoraproject/fedora:24|fasterxml/jackson-dataformat-xml:* | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184561.html|http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184561.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | fedoraproject/fedora | False | Unknown | nan |
CVE-2016-5118 | The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename. | 2016-06-10 | 2026-05-06 | UNKNOWN | graphicsmagick/graphicsmagick:*|suse/linux_enterprise_debuginfo:11|suse/studio_onsite:1.3|suse/linux_enterprise_software_development_kit:11|oracle/solaris:10|oracle/solaris:11.3|oracle/linux:6|oracle/linux:7|opensuse/leap:42.1|opensuse/opensuse:13.2 | http://git.imagemagick.org/repos/ImageMagick/commit/40639d173aa8c76b850d625c630b711fee4dcfb8|http://hg.code.sf.net/p/graphicsmagick/code/file/41876934e762/ChangeLog|http://hg.code.sf.net/p/graphicsmagick/code/rev/ae3928faa858|http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00008.html|http://lists.opensu... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | graphicsmagick/graphicsmagick | False | Unknown | nan |
CVE-2016-2473 | The Qualcomm Wi-Fi driver in Android before 2016-06-01 on Nexus 7 (2013) devices allows attackers to gain privileges via a crafted application, aka internal bug 27777501. | 2016-06-13 | 2026-05-06 | UNKNOWN | google/android:* | http://source.android.com/security/bulletin/2016-06-01.html|http://source.android.com/security/bulletin/2016-06-01.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-2496 | The Framework UI permission-dialog implementation in Android 6.x before 2016-06-01 allows attackers to conduct tapjacking attacks and access arbitrary private-storage files by creating a partially overlapping window, aka internal bug 26677796. | 2016-06-13 | 2026-05-06 | CWE-1021 | google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-06-01.html|https://android.googlesource.com/platform/frameworks/base/+/613f63b938145bb86cd64fe0752eaf5e99b5f628|https://android.googlesource.com/platform/frameworks/native/+/03a53d1c7765eeb3af0bc34c3dff02ada1953fbf|https://android.googlesource.com/platform/packages/apps/... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-5302 | Citrix XenServer 7.0 before Hotfix XS70E003, when a deployment has been upgraded from an earlier release, might allow remote attackers on the management network to "compromise" a host by leveraging credentials for an Active Directory account. | 2016-06-13 | 2026-05-06 | CWE-284 | citrix/xenserver:* | http://support.citrix.com/article/CTX213549|http://www.securitytracker.com/id/1036082|https://support.citrix.com/article/CTX213769|http://support.citrix.com/article/CTX213549|http://www.securitytracker.com/id/1036082 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | citrix/xenserver | False | Unknown | nan |
CVE-2015-8869 | OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function. | 2016-06-13 | 2026-05-06 | CWE-119|CWE-200 | fedoraproject/fedora:24|opensuse/opensuse:13.2|ocaml/ocaml:* | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184507.html|http://lists.opensuse.org/opensuse-updates/2016-05/msg00081.html|http://lists.opensuse.org/opensuse-updates/2016-09/msg00037.html|http://rhn.redhat.com/errata/RHSA-2016-2576.html|http://rhn.redhat.com/errata/RHSA-2017-0564.html | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | Buffer Overflow | Execution | 80.0 | HIGH | fedoraproject/fedora | False | Unknown | nan |
CVE-2016-5365 | Stack-based buffer overflow in Huawei Honor WS851 routers with software 1.1.21.1 and earlier allows remote attackers to execute arbitrary commands with root privileges via unspecified vectors, aka HWPSIRT-2016-05051. | 2016-06-14 | 2026-05-06 | CWE-264 | huawei/honor_ws851_firmware:* | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160607-01-honorrouter-en|http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160607-01-honorrouter-en | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | huawei/honor_ws851_firmware | False | Unknown | nan |
CVE-2016-3227 | Use-after-free vulnerability in the DNS Server component in Microsoft Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Server Use After Free Vulnerability." | 2016-06-16 | 2026-05-06 | UNKNOWN | microsoft/windows_server_2012:-|microsoft/windows_server_2012:r2|microsoft/windows_server_2012:r2|microsoft/windows_server_2012:r2 | http://www.securitytracker.com/id/1036095|https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-071|http://www.securitytracker.com/id/1036095|https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-071 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | microsoft/windows_server_2012 | False | Unknown | nan |
CVE-2016-3236 | The Web Proxy Auto Discovery (WPAD) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mishandles proxy discovery, which allows remote attackers to redirect network traffic ... | 2016-06-16 | 2026-05-06 | CWE-19 | microsoft/windows_10:-|microsoft/windows_10:1511|microsoft/windows_7:*|microsoft/windows_8.1:*|microsoft/windows_rt_8.1:*|microsoft/windows_server_2008:*|microsoft/windows_server_2008:r2|microsoft/windows_server_2012:-|microsoft/windows_server_2012:r2|microsoft/windows_vista:* | http://www.securitytracker.com/id/1036104|https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-077|http://www.securitytracker.com/id/1036104|https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-077 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | microsoft/windows_10 | False | Unknown | nan |
CVE-2016-4120 | Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows and OS X and before 11.2.202.621 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1096, CVE-2016-1098, CVE-2016-109... | 2016-06-16 | 2026-05-06 | CWE-119 | adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/air_sdk_\&_compiler:*|adobe/air_sdk:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player_desktop_runtime:*|adobe/air_desktop_runtime:* | http://rhn.redhat.com/errata/RHSA-2016-1079.html|http://www.securityfocus.com/bid/90618|https://helpx.adobe.com/security/products/flash-player/apsb16-15.html|https://security.gentoo.org/glsa/201606-08|http://rhn.redhat.com/errata/RHSA-2016-1079.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/flash_player | False | Unknown | nan |
CVE-2016-4121 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows and OS X and before 11.2.202.621 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1097, CVE-2016-1106, CVE-2016-1107, CVE-2016-1108,... | 2016-06-16 | 2026-05-06 | CWE-416 | adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/air_sdk_\&_compiler:*|adobe/air_sdk:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player_desktop_runtime:*|adobe/air_desktop_runtime:* | http://rhn.redhat.com/errata/RHSA-2016-1079.html|http://www.securityfocus.com/bid/90797|https://helpx.adobe.com/security/products/flash-player/apsb16-15.html|https://security.gentoo.org/glsa/201606-08|http://rhn.redhat.com/errata/RHSA-2016-1079.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | adobe/flash_player | False | Unknown | nan |
CVE-2016-4138 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. | 2016-06-16 | 2026-05-06 | UNKNOWN | redhat/enterprise_linux_desktop:5.0|redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_server:5.0|redhat/enterprise_linux_server:6.0|redhat/enterprise_linux_workstation:5.0|redhat/enterprise_linux_workstation:6.0|adobe/flash_player:*|adobe/flash_player_desktop_runtime:*|adobe/flash_player:*|adobe/flash_player:... | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html|http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html|http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html|http://www.securitytracker.com/id/1036117|https://access.redhat.com/errata/RHSA-2016:1238 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | redhat/enterprise_linux_desktop | False | Unknown | nan |
CVE-2016-4160 | Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows and OS X and before 11.2.202.621 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1096, CVE-2016-1098, CVE-2016-109... | 2016-06-16 | 2026-05-06 | CWE-119 | adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/air_sdk_\&_compiler:*|adobe/air_sdk:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player_desktop_runtime:*|adobe/air_desktop_runtime:* | http://rhn.redhat.com/errata/RHSA-2016-1079.html|http://www.securityfocus.com/bid/90618|https://helpx.adobe.com/security/products/flash-player/apsb16-15.html|https://security.gentoo.org/glsa/201606-08|http://rhn.redhat.com/errata/RHSA-2016-1079.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/flash_player | False | Unknown | nan |
CVE-2016-4161 | Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows and OS X and before 11.2.202.621 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1096, CVE-2016-1098, CVE-2016-109... | 2016-06-16 | 2026-05-06 | CWE-119 | adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/air_sdk_\&_compiler:*|adobe/air_sdk:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player_desktop_runtime:*|adobe/air_desktop_runtime:* | http://rhn.redhat.com/errata/RHSA-2016-1079.html|http://www.securityfocus.com/bid/90618|https://helpx.adobe.com/security/products/flash-player/apsb16-15.html|https://security.gentoo.org/glsa/201606-08|http://rhn.redhat.com/errata/RHSA-2016-1079.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/flash_player | False | Unknown | nan |
CVE-2016-4162 | Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows and OS X and before 11.2.202.621 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1096, CVE-2016-1098, CVE-2016-109... | 2016-06-16 | 2026-05-06 | CWE-119 | adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/air_sdk_\&_compiler:*|adobe/air_sdk:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player_desktop_runtime:*|adobe/air_desktop_runtime:* | http://rhn.redhat.com/errata/RHSA-2016-1079.html|http://www.securityfocus.com/bid/90618|https://helpx.adobe.com/security/products/flash-player/apsb16-15.html|https://security.gentoo.org/glsa/201606-08|http://rhn.redhat.com/errata/RHSA-2016-1079.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/flash_player | False | Unknown | nan |
CVE-2016-4163 | Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows and OS X and before 11.2.202.621 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1096, CVE-2016-1098, CVE-2016-109... | 2016-06-16 | 2026-05-06 | CWE-119 | adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/air_sdk_\&_compiler:*|adobe/air_sdk:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player_desktop_runtime:*|adobe/air_desktop_runtime:* | http://rhn.redhat.com/errata/RHSA-2016-1079.html|http://www.securityfocus.com/bid/90618|https://helpx.adobe.com/security/products/flash-player/apsb16-15.html|https://security.gentoo.org/glsa/201606-08|http://rhn.redhat.com/errata/RHSA-2016-1079.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/flash_player | False | Unknown | nan |
CVE-2016-4165 | The extension manager in Adobe Brackets before 1.7 allows attackers to have an unspecified impact via invalid input. | 2016-06-16 | 2026-05-06 | CWE-20 | adobe/brackets:* | https://helpx.adobe.com/security/products/brackets/apsb16-20.html|https://helpx.adobe.com/security/products/brackets/apsb16-20.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | adobe/brackets | False | Unknown | nan |
CVE-2016-4167 | Adobe DNG Software Development Kit (SDK) before 1.4 2016 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | 2016-06-16 | 2026-05-06 | CWE-119 | adobe/dng_software_development_kit:* | https://helpx.adobe.com/security/products/dng-sdk/apsb16-19.html|https://helpx.adobe.com/security/products/dng-sdk/apsb16-19.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/dng_software_development_kit | False | Unknown | nan |
CVE-2016-4171 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016. | 2016-06-16 | 2026-04-21 | UNKNOWN | adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|adobe/flash_player:*|redhat/enterprise_linux_desktop:5.0|redhat/enterprise_linux_desktop:6.0|redhat/enterprise_linux_server:5.0 | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html|http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html|http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html|http://www.securityfocus.com/bid/91184|http://www.securitytracker.com/id/1036094 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 100.0 | CRITICAL | adobe/flash_player | True | Unknown | The impacted product is end-of-life and should be disconnected if still in use. |
CVE-2015-8914 | The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a link-local source address. | 2016-06-17 | 2026-05-06 | CWE-254 | openstack/neutron:*|openstack/neutron:* | http://www.openwall.com/lists/oss-security/2016/06/10/5|http://www.openwall.com/lists/oss-security/2016/06/10/6|https://access.redhat.com/errata/RHSA-2016:1473|https://access.redhat.com/errata/RHSA-2016:1474|https://bugs.launchpad.net/neutron/+bug/1502933 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | Other | Unknown | 95.0 | CRITICAL | openstack/neutron | False | Unknown | nan |
CVE-2016-3642 | The RMI service in SolarWinds Virtualization Manager 6.3.1 and earlier allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library. | 2016-06-17 | 2026-05-06 | UNKNOWN | solarwinds/virtualization_manager:* | http://packetstormsecurity.com/files/137486/Solarwinds-Virtualization-Manager-6.3.1-Java-Deserialization.html|http://seclists.org/fulldisclosure/2016/Jun/25|http://seclists.org/fulldisclosure/2016/Jun/29|http://packetstormsecurity.com/files/137486/Solarwinds-Virtualization-Manager-6.3.1-Java-Deserialization.html|http:/... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | solarwinds/virtualization_manager | False | Unknown | nan |
CVE-2016-1395 | The web-based management interface on Cisco RV110W devices with firmware before 1.2.1.7, RV130W devices with firmware before 1.0.3.16, and RV215W devices with firmware before 1.3.0.8 allows remote attackers to execute arbitrary code as root via a crafted HTTP request, aka Bug ID CSCux82428. | 2016-06-19 | 2026-05-06 | CWE-20 | cisco/rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.0.21|cisco/rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.1.3|cisco/rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.2.7|cisco/rv215w_wireless-n_vpn_router_firmware:1.1.0.5|cisco/rv215w_wireless-n_vpn_router_firmware:1.1.0.6|cisco/rv215w_wire... | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv|http://www.securitytracker.com/id/1036113|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv|http://www.securitytracker.com/id/1036113 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | cisco/rv130w_wireless-n_multifunction_vpn_router_firmware | False | Unknown | nan |
CVE-2016-4819 | The printfDx function in Takumi Yamada DX Library for Borland C++ 3.13f through 3.16b, DX Library for Gnu C++ 3.13f through 3.16b, and DX Library for Visual C++ 3.13f through 3.16b allows remote attackers to execute arbitrary code via a crafted string. | 2016-06-19 | 2026-05-06 | UNKNOWN | dx_library_project/dx_library:*|dx_library_project/dx_library:*|dx_library_project/dx_library:* | http://dxlib.o.oo7.jp/dxvulnerability.html|http://jvn.jp/en/jp/JVN15205734/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000099|http://dxlib.o.oo7.jp/dxvulnerability.html|http://jvn.jp/en/jp/JVN15205734/index.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | dx_library_project/dx_library | False | Unknown | nan |
CVE-2016-0912 | EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 allows remote authenticated users to bypass intended password-change restrictions by leveraging access to (1) a different account with the same role as a target account or (2) an account's session at an unattended workstation. | 2016-06-19 | 2026-05-06 | CWE-264 | dell/emc_data_domain_os:* | http://seclists.org/bugtraq/2016/Jun/50|http://www.securitytracker.com/id/1036079|http://seclists.org/bugtraq/2016/Jun/50|http://www.securitytracker.com/id/1036079 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | dell/emc_data_domain_os | False | Unknown | nan |
CVE-2016-2177 | OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t... | 2016-06-20 | 2026-05-06 | CWE-190 | hp/icewall_mcrp:3.0|hp/icewall_sso:10.0|hp/icewall_sso:10.0|hp/icewall_sso_agent_option:10.0|openssl/openssl:1.0.1|openssl/openssl:1.0.1a|openssl/openssl:1.0.1b|openssl/openssl:1.0.1c|openssl/openssl:1.0.1d|openssl/openssl:1.0.1e | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759|http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html|http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html|http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html|http://lists.opensuse.org/opens... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | hp/icewall_mcrp | False | Unknown | nan |
CVE-2016-2362 | Fonality (previously trixbox Pro) 12.6 through 14.1i before 2016-06-01 has a hardcoded password for the FTP account, which allows remote attackers to obtain access via a (1) FTP or (2) SSH connection. | 2016-06-20 | 2026-05-06 | UNKNOWN | fonality/fonality:12.6|fonality/fonality:12.8|fonality/fonality:14.1i | http://www.kb.cert.org/vuls/id/754056|http://www.kb.cert.org/vuls/id/754056 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | fonality/fonality | False | Unknown | nan |
CVE-2016-4519 | Stack-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.30 allows remote attackers to execute arbitrary code via a crafted filename field in a ZIP archive in a vlp file. | 2016-06-25 | 2026-05-06 | CWE-119 | unitronics/visilogic_oplc_ide:* | http://www.securityfocus.com/bid/91402|http://zerodayinitiative.com/advisories/ZDI-16-375/|https://ics-cert.us-cert.gov/advisories/ICSA-16-175-02|http://www.securityfocus.com/bid/91402|http://zerodayinitiative.com/advisories/ZDI-16-375/ | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | unitronics/visilogic_oplc_ide | False | Unknown | nan |
CVE-2015-7987 | Multiple buffer overflows in mDNSResponder before 625.41.2 allow remote attackers to read or write to out-of-bounds memory locations via vectors involving the (1) GetValueForIPv4Addr, (2) GetValueForMACAddr, (3) rfc3110_import, or (4) CopyNSEC3ResourceRecord function. | 2016-06-26 | 2026-05-06 | CWE-119 | apple/iphone_os:*|apple/mac_os_x:*|apple/mac_os_x:*|apple/mac_os_x:*|apple/watchos:*|apple/airport_base_station_firmware:*|apple/airport_base_station_firmware:*|apple/mdnsresponder:* | http://www.kb.cert.org/vuls/id/143335|http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html|http://www.securityfocus.com/bid/91323|http://www.securitytracker.com/id/1036181|https://support.apple.com/HT206846 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | apple/iphone_os | False | Unknown | nan |
CVE-2015-7988 | The handle_regservice_request function in mDNSResponder before 625.41.2 allows remote attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference) via unspecified vectors. | 2016-06-26 | 2026-05-06 | UNKNOWN | apple/iphone_os:*|apple/mac_os_x:*|apple/mac_os_x:*|apple/mac_os_x:*|apple/watchos:*|apple/airport_base_station_firmware:*|apple/airport_base_station_firmware:*|apple/mdnsresponder:* | http://www.kb.cert.org/vuls/id/143335|http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html|http://www.securitytracker.com/id/1036181|https://support.apple.com/HT206846|http://www.kb.cert.org/vuls/id/143335 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | apple/iphone_os | False | Unknown | nan |
CVE-2016-0224 | SQL injection vulnerability in IBM Marketing Platform 8.5.x, 8.6.x, and 9.x before 9.1.2.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | 2016-06-28 | 2026-05-06 | CWE-89 | ibm/marketing_platform:8.5.0.0|ibm/marketing_platform:8.5.0.1|ibm/marketing_platform:8.5.0.2|ibm/marketing_platform:8.5.0.3|ibm/marketing_platform:8.5.0.4|ibm/marketing_platform:8.5.0.5|ibm/marketing_platform:8.5.0.6|ibm/marketing_platform:8.5.0.7|ibm/marketing_platform:8.6.0.0|ibm/marketing_platform:8.6.0.1 | http://www-01.ibm.com/support/docview.wss?uid=swg21980989|http://www-01.ibm.com/support/docview.wss?uid=swg21980989 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 83.5 | HIGH | ibm/marketing_platform | False | Unknown | nan |
CVE-2016-2141 | It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing,... | 2016-06-30 | 2026-05-06 | UNKNOWN | redhat/jgroups:*|redhat/jboss_enterprise_application_platform:5.2|redhat/jboss_enterprise_application_platform:6.4|redhat/jboss_enterprise_application_platform:7.0 | http://rhn.redhat.com/errata/RHSA-2016-1435.html|http://rhn.redhat.com/errata/RHSA-2016-1439.html|http://rhn.redhat.com/errata/RHSA-2016-2035.html|http://www.securityfocus.com/bid/91481|http://www.securitytracker.com/id/1036165 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | redhat/jgroups | False | Unknown | nan |
CVE-2016-3645 | Integer overflow in the TNEF unpacker in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec End... | 2016-06-30 | 2026-05-06 | CWE-189 | symantec/norton_security:*|symantec/protection_engine:*|symantec/protection_engine:*|symantec/protection_engine:7.8.0|symantec/advanced_threat_protection:*|symantec/norton_bootable_removal_tool:*|symantec/data_center_security_server:6.0|symantec/data_center_security_server:6.0|symantec/data_center_security_server:6.5|s... | http://www.securityfocus.com/bid/91439|http://www.securitytracker.com/id/1036198|http://www.securitytracker.com/id/1036199|https://www.exploit-db.com/exploits/40035/|https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160628_00 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | symantec/norton_security | False | Unknown | nan |
CVE-2016-0391 | The IBM Watson Developer Cloud services on Bluemix platforms do not properly generate random numbers for service-instance credentials, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack. | 2016-07-02 | 2026-05-06 | CWE-284 | ibm/watson_developer_cloud:- | http://www-01.ibm.com/support/docview.wss?uid=swg21982615|http://www-01.ibm.com/support/docview.wss?uid=swg21982615 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | ibm/watson_developer_cloud | False | Unknown | nan |
CVE-2016-1289 | The API in Cisco Prime Infrastructure 1.2 through 3.0 and Evolved Programmable Network Manager (EPNM) 1.2 allows remote attackers to execute arbitrary code or obtain sensitive management information via a crafted HTTP request, as demonstrated by discovering managed-device credentials, aka Bug ID CSCuy10231. | 2016-07-02 | 2026-05-06 | CWE-119 | cisco/prime_infrastructure:1.2|cisco/prime_infrastructure:1.2.0.103|cisco/prime_infrastructure:1.2.1|cisco/prime_infrastructure:1.3|cisco/prime_infrastructure:1.3.0.20|cisco/prime_infrastructure:1.4|cisco/prime_infrastructure:1.4.0.45|cisco/prime_infrastructure:1.4.1|cisco/prime_infrastructure:1.4.2|cisco/prime_infrast... | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-piauthbypass|http://www.securityfocus.com/bid/91504|http://www.securitytracker.com/id/1036195|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-piauthbypass|http://www.securityfocus.com/bid/91504 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | cisco/prime_infrastructure | False | Unknown | nan |
CVE-2016-1416 | Cisco Prime Collaboration Provisioning 10.6 SP2 (aka 10.6.0.10602) mishandles LDAP authentication, which allows remote attackers to obtain administrator privileges via a crafted login attempt, aka Bug ID CSCuv37513. | 2016-07-02 | 2026-05-06 | CWE-264 | cisco/prime_collaboration_provisioning:10.6.2 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-cpcpauthbypass|http://www.securityfocus.com/bid/91505|http://www.securitytracker.com/id/1036212|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-cpcpauthbypass|http://www.securityfocus.com/bid/91... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | cisco/prime_collaboration_provisioning | False | Unknown | nan |
CVE-2015-7029 | Apple AirPort Base Station Firmware before 7.6.7 and 7.7.x before 7.7.7 misparses DNS data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | 2016-07-03 | 2026-05-06 | CWE-119 | apple/airport_base_station_firmware:*|apple/airport_base_station_firmware:7.7.0|apple/airport_base_station_firmware:7.7.3 | http://lists.apple.com/archives/security-announce/2016/Jun/msg00000.html|http://www.securitytracker.com/id/1036136|https://support.apple.com/HT206849|http://lists.apple.com/archives/security-announce/2016/Jun/msg00000.html|http://www.securitytracker.com/id/1036136 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | apple/airport_base_station_firmware | False | Unknown | nan |
CVE-2016-1606 | Multiple stack-based buffer overflows in COM objects in Micro Focus Rumba 9.4.x before 9.4 HF 13960 allow remote attackers to execute arbitrary code via (1) the NetworkName property value to ObjectXSNAConfig.ObjectXSNAConfig in iconfig.dll, (2) the CPName property value to ObjectXSNAConfig.ObjectXSNAConfig in iconfig.d... | 2016-07-03 | 2026-05-06 | CWE-119 | microfocus/rumba:9.4 | http://community.microfocus.com/microfocus/mainframe_solutions/rumba/w/knowledge_base/28601.rumba-9-4-stack-buffer-overflow-vulnerabilities.aspx|http://www.securityfocus.com/bid/91548|http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5327.php|https://cxsecurity.com/issue/WLB-2016050136|http://community.microfocus.c... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | microfocus/rumba | False | Unknown | nan |
CVE-2016-5228 | Stack-based buffer overflow in the PlayMacro function in ObjectXMacro.ObjectXMacro in WdMacCtl.ocx in Micro Focus Rumba 9.x before 9.3 HF 11997 and 9.4.x before 9.4 HF 12815 allows remote attackers to execute arbitrary code via a long MacroName argument. NOTE: some references mention CVE-2016-5226 but that is not a cor... | 2016-07-03 | 2026-05-06 | CWE-119 | microfocus/rumba:9.4 | http://community.microfocus.com/microfocus/mainframe_solutions/rumba/w/knowledge_base/28600.micro-focus-rumba-9-x-security-update.aspx|http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5327.php|https://cxsecurity.com/issue/WLB-2016050136|https://www.exploit-db.com/exploits/40649/|http://community.microfocus.com/mic... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | microfocus/rumba | False | Unknown | nan |
CVE-2016-5703 | SQL injection vulnerability in libraries/central_columns.lib.php in phpMyAdmin 4.4.x before 4.4.15.7 and 4.6.x before 4.6.3 allows remote attackers to execute arbitrary SQL commands via a crafted database name that is mishandled in a central column query. | 2016-07-03 | 2026-05-06 | CWE-89 | opensuse/leap:42.1|opensuse/opensuse:13.1|opensuse/opensuse:13.2|phpmyadmin/phpmyadmin:4.4.0|phpmyadmin/phpmyadmin:4.4.1|phpmyadmin/phpmyadmin:4.4.1.1|phpmyadmin/phpmyadmin:4.4.2|phpmyadmin/phpmyadmin:4.4.3|phpmyadmin/phpmyadmin:4.4.4|phpmyadmin/phpmyadmin:4.4.5 | http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html|http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html|http://www.securityfocus.com/bid/91381|https://github.com/phpmyadmin/phpmyadmin/commit/ef6c66dca1b0cb0a1a482477938cfc859d2baee3|https://security.gentoo.org/glsa/201701-32 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 83.5 | HIGH | opensuse/leap | False | Unknown | nan |
CVE-2016-5734 | phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementa... | 2016-07-03 | 2026-05-06 | CWE-94 | phpmyadmin/phpmyadmin:4.0.0|phpmyadmin/phpmyadmin:4.0.1|phpmyadmin/phpmyadmin:4.0.2|phpmyadmin/phpmyadmin:4.0.3|phpmyadmin/phpmyadmin:4.0.4|phpmyadmin/phpmyadmin:4.0.4.1|phpmyadmin/phpmyadmin:4.0.4.2|phpmyadmin/phpmyadmin:4.0.5|phpmyadmin/phpmyadmin:4.0.6|phpmyadmin/phpmyadmin:4.0.7 | http://www.securityfocus.com/bid/91387|https://github.com/phpmyadmin/phpmyadmin/commit/1cc7466db3a05e95fe57a6702f41773e6829d54b|https://github.com/phpmyadmin/phpmyadmin/commit/4bcc606225f15bac0b07780e74f667f6ac283da7|https://security.gentoo.org/glsa/201701-32|https://www.exploit-db.com/exploits/40185/ | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Code Injection | Execution | 98.5 | CRITICAL | phpmyadmin/phpmyadmin | False | Unknown | nan |
CVE-2016-2074 | Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command. | 2016-07-03 | 2026-05-06 | CWE-119 | openvswitch/openvswitch:2.2.0|openvswitch/openvswitch:2.3.0|openvswitch/openvswitch:2.3.1|openvswitch/openvswitch:2.3.2|openvswitch/openvswitch:2.4.0|redhat/openshift:3.1 | http://openvswitch.org/pipermail/announce/2016-March/000082.html|http://openvswitch.org/pipermail/announce/2016-March/000083.html|http://rhn.redhat.com/errata/RHSA-2016-0523.html|http://rhn.redhat.com/errata/RHSA-2016-0524.html|http://rhn.redhat.com/errata/RHSA-2016-0537.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | openvswitch/openvswitch | False | Unknown | nan |
CVE-2016-3955 | The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet. | 2016-07-03 | 2026-05-06 | CWE-119 | canonical/ubuntu_linux:12.04|canonical/ubuntu_linux:12.04|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:14.04|canonical/ubuntu_linux:15.10|linux/linux_kernel:*|linux/linux_kernel:*|linux/linux_kernel:*|linux/linux_kernel:*|linux/linux_kernel:* | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb|http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html|http://www.debian.org/security/2016/dsa-3607|http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3|http://www.openwall.com/l... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | canonical/ubuntu_linux | False | Unknown | nan |
CVE-2016-4438 | The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression. | 2016-07-04 | 2026-05-06 | CWE-20 | apache/struts:2.3.20|apache/struts:2.3.20.1|apache/struts:2.3.20.3|apache/struts:2.3.24|apache/struts:2.3.24.1|apache/struts:2.3.24.3|apache/struts:2.3.28 | http://jvn.jp/en/jp/JVN07710476/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110|http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html|http://www.securityfocus.com/bid/91275|https://bugzilla.redhat.com/show_bug.cgi?id=1348238 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | apache/struts | False | Unknown | nan |
CVE-2016-2506 | DRMExtractor.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not validate a certain offset value, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, ak... | 2016-07-11 | 2026-05-06 | CWE-119 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-07-01.html|https://android.googlesource.com/platform/frameworks/av/+/e248db02fbab2ee9162940bc19f087fd7d96cb9d|http://source.android.com/security/bulletin/2016-07-01.html|https://android.googlesource.com/platform/frameworks/av/+/e248db02fbab2ee9162940bc19f087fd7d96cb9d | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3741 | The H.264 decoder in mediaserver in Android 6.x before 2016-07-01 does not initialize certain slice data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 28165661. | 2016-07-11 | 2026-05-06 | CWE-20 | google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-07-01.html|https://android.googlesource.com/platform/external/libavc/+/cc676ebd95247646e67907ccab150fb77a847335|https://android.googlesource.com/platform/external/libavc/+/e629194c62a9a129ce378e08cb1059a8a53f1795|http://source.android.com/security/bulletin/2016-07-01.htm... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3742 | decoder/ih264d_process_intra_mb.c in mediaserver in Android 6.x before 2016-07-01 mishandles intra mode, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 28165659. | 2016-07-11 | 2026-05-06 | CWE-20 | google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-07-01.html|https://android.googlesource.com/platform/external/libavc/+/a583270e1c96d307469c83dc42bd3c5f1b9ef63f|http://source.android.com/security/bulletin/2016-07-01.html|https://android.googlesource.com/platform/external/libavc/+/a583270e1c96d307469c83dc42bd3c5f1b9ef63... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3743 | decoder/ih264d_api.c in mediaserver in Android 6.x before 2016-07-01 does not initialize certain data structures, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 27907656. | 2016-07-11 | 2026-05-06 | CWE-20 | google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-07-01.html|https://android.googlesource.com/platform/external/libavc/+/ecf6c7ce6d5a22d52160698aab44fc234c63291a|http://source.android.com/security/bulletin/2016-07-01.html|https://android.googlesource.com/platform/external/libavc/+/ecf6c7ce6d5a22d52160698aab44fc234c63291... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3745 | Multiple buffer overflows in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allow attackers to gain privileges via a crafted application that provides an AudioEffect reply, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 28... | 2016-07-11 | 2026-05-06 | CWE-119 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-07-01.html|https://android.googlesource.com/platform/hardware/qcom/audio/+/073a80800f341325932c66818ce4302b312909a4|http://source.android.com/security/bulletin/2016-07-01.html|https://android.googlesource.com/platform/hardware/qcom/audio/+/073a80800f341325932c66818ce4302... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-4503 | Moxa Device Server Web Console 5232-N allows remote attackers to bypass authentication, and consequently modify settings and data, via vectors related to reading a cookie parameter containing a UserId value. | 2016-07-12 | 2026-05-06 | CWE-287 | moxa/device_server_web_console_5232-n_firmware:- | http://www.securityfocus.com/bid/91670|https://ics-cert.us-cert.gov/advisories/ICSA-16-189-02|http://www.securityfocus.com/bid/91670|https://ics-cert.us-cert.gov/advisories/ICSA-16-189-02 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 98.5 | CRITICAL | moxa/device_server_web_console_5232-n_firmware | False | Unknown | nan |
CVE-2016-4191 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4192 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4193 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4194 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4201 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|https://www.exploit-db.com/exploits/40101/|http://www.securityfocus.com/bid/91716 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4203 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|https://www.exploit-db.com/exploits/40097/|http://www.securityfocus.com/bid/91716 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4204 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|https://www.exploit-db.com/exploits/40096/|http://www.securityfocus.com/bid/91716 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4205 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|https://www.exploit-db.com/exploits/40095/|http://www.securityfocus.com/bid/91716 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4206 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|https://www.exploit-db.com/exploits/40100/|http://www.securityfocus.com/bid/91716 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4207 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|https://www.exploit-db.com/exploits/40099/|http://www.securityfocus.com/bid/91716 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4208 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|https://www.exploit-db.com/exploits/40098/|http://www.securityfocus.com/bid/91716 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4209 | Heap-based buffer overflow in Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors. | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91711|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91711|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4210 | Integer overflow in Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors. | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91710|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91710|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4211 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4212 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4213 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4214 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4215 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors. | 2016-07-13 | 2026-05-06 | CWE-254|CWE-284 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91712|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91712|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4250 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4251 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|http://www.zerodayinitiative.com/advisories/ZDI-16-421|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4252 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4254 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-07-13 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/91716|http://www.securitytracker.com/id/1036281 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-5008 | libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server. | 2016-07-13 | 2026-05-06 | CWE-284 | redhat/libvirt:*|debian/debian_linux:8.0 | http://lists.opensuse.org/opensuse-updates/2016-07/msg00054.html|http://lists.opensuse.org/opensuse-updates/2016-07/msg00055.html|http://lists.opensuse.org/opensuse-updates/2016-08/msg00024.html|http://rhn.redhat.com/errata/RHSA-2016-2577.html|http://security.libvirt.org/2016/0001.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | redhat/libvirt | False | Unknown | nan |
CVE-2016-4372 | HPE iMC PLAT before 7.2 E0403P04, iMC EAD before 7.2 E0405P05, iMC APM before 7.2 E0401P04, iMC NTA before 7.2 E0401P01, iMC BIMS before 7.2 E0402P02, and iMC UAM_TAM before 7.2 E0405P05 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections ... | 2016-07-15 | 2026-05-06 | CWE-20 | hp/intelligent_management_center_application_performance_manager:*|hp/intelligent_management_center_branch_intelligent_management_system:*|hp/intelligent_management_center_endpoint_admission_defense:*|hp/intelligent_management_center_network_traffic_analyzer:*|hp/intelligent_management_center_platform:*|hp/intelligent_... | http://www.securityfocus.com/bid/91739|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05200601|https://www.exploit-db.com/exploits/42756/|http://www.securityfocus.com/bid/91739|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05200601 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | hp/intelligent_management_center_application_performance_manager | False | Unknown | nan |
CVE-2016-4520 | Schneider Electric Pelco Digital Sentry Video Management System with firmware before 7.14 has hardcoded credentials, which allows remote attackers to obtain access, and consequently execute arbitrary code, via unspecified vectors. | 2016-07-15 | 2026-05-06 | UNKNOWN | schneider-electric/pelco_digital_sentry_video_management_system_firmware:* | http://www.schneider-electric.com/ww/en/download/document/SEVD-2016-153-01|http://www.securityfocus.com/bid/91783|https://ics-cert.us-cert.gov/advisories/ICSA-16-196-01|http://www.schneider-electric.com/ww/en/download/document/SEVD-2016-153-01|http://www.securityfocus.com/bid/91783 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | schneider-electric/pelco_digital_sentry_video_management_system_firmware | False | Unknown | nan |
CVE-2016-5804 | Moxa MGate MB3180 before 1.8, MGate MB3280 before 2.7, MGate MB3480 before 2.6, MGate MB3170 before 2.5, and MGate MB3270 before 2.7 use weak encryption, which allows remote attackers to bypass authentication via a brute-force series of guesses for a parameter value. | 2016-07-15 | 2026-05-06 | CWE-326 | moxa/mgate_mb3180_firmware:*|moxa/mgate_mb3280_firmware:*|moxa/mgate_mb3480_firmware:*|moxa/mgate_mb3170_firmware:*|moxa/mgate_mb3270_firmware:* | http://www.securityfocus.com/bid/91777|https://ics-cert.us-cert.gov/advisories/ICSA-16-196-02|http://www.securityfocus.com/bid/91777|https://ics-cert.us-cert.gov/advisories/ICSA-16-196-02 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | moxa/mgate_mb3180_firmware | False | Unknown | nan |
CVE-2016-5080 | Integer overflow in the rtxMemHeapAlloc function in asn1rt_a.lib in Objective Systems ASN1C for C/C++ before 7.0.2 allows context-dependent attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow), on a system running an application compiled by ASN1C, via crafted ASN.1 data. | 2016-07-19 | 2026-05-06 | UNKNOWN | objective_systems/asn1c:* | http://packetstormsecurity.com/files/137970/Objective-Systems-Inc.-ASN1C-For-C-C-Heap-Memory-Corruption.html|http://seclists.org/fulldisclosure/2016/Jul/65|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160721-asn1c|http://www.kb.cert.org/vuls/id/790839|http://www.oracle.com/technetwork... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | objective_systems/asn1c | False | Unknown | nan |
CVE-2016-3444 | Unspecified vulnerability in the Oracle Retail Integration Bus component in Oracle Retail Applications 13.0, 13.1, 13.2, 14.0, 14.1, and 15.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Install. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/retail_integration_bus:13.0|oracle/retail_integration_bus:13.1|oracle/retail_integration_bus:13.2|oracle/retail_integration_bus:14.0|oracle/retail_integration_bus:14.1|oracle/retail_integration_bus:15.0 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/91883|http://www.securitytracker.com/id/1036397|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/retail_integration_bus | False | Unknown | nan |
CVE-2016-3468 | Unspecified vulnerability in the Oracle Agile Engineering Data Management component in Oracle Supply Chain Products Suite 6.1.3.0 and 6.2.0.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Install. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/agile_engineering_data_management:6.1.3.0|oracle/agile_engineering_data_management:6.2.0.0 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/91922|http://www.securitytracker.com/id/1036402|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/agile_engineering_data_management | False | Unknown | nan |
CVE-2016-3493 | Unspecified vulnerability in the Hyperion Financial Reporting component in Oracle Hyperion 11.1.2.4 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Security Models. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/hyperion_financial_reporting:11.1.2.4 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/91840|http://www.securitytracker.com/id/1036399|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/hyperion_financial_reporting | False | Unknown | nan |
CVE-2016-3499 | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 12.1.3.0 and 12.2.1.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Web Container. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/weblogic_server:12.1.3.0.0|oracle/weblogic_server:12.2.1.0.0 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/92019|http://www.securitytracker.com/id/1036373|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/weblogic_server | False | Unknown | nan |
CVE-2016-3504 | Unspecified vulnerability in the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.1.9.0, 11.1.2.4.0, 12.1.3.0.0, and 12.2.1.0.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to ADF Faces. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/jdeveloper:11.1.1.7.0|oracle/jdeveloper:11.1.1.9.0|oracle/jdeveloper:11.1.2.4.0|oracle/jdeveloper:12.1.3.0.0|oracle/jdeveloper:12.2.1.0.0 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/92023|http://www.securitytracker.com/id/1036370|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/jdeveloper | False | Unknown | nan |
CVE-2016-3510 | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to WLS Core Components, a different vulnerability than CVE-2016-3586. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/weblogic_server:10.3.6.0.0|oracle/weblogic_server:12.1.3.0.0|oracle/weblogic_server:12.2.1.0.0 | http://packetstormsecurity.com/files/152324/Oracle-Weblogic-Server-Deserialization-MarshalledObject-Remote-Code-Execution.html|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securitytracker.com/id/1036373|https://www.tenable.com/security/res... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/weblogic_server | False | Unknown | nan |
CVE-2016-3527 | Unspecified vulnerability in the Oracle Demand Planning component in Oracle Supply Chain Products Suite 12.1 and 12.2 allows remote attackers to affect confidentiality and integrity via vectors related to ODPDA Servlet. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/demand_planning:12.1|oracle/demand_planning:12.2 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/91946|http://www.securitytracker.com/id/1036402|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Unknown | Unknown | 95.0 | CRITICAL | oracle/demand_planning | False | Unknown | nan |
CVE-2016-3541 | Unspecified vulnerability in the Oracle Common Applications Calendar component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect confidentiality and integrity via vectors related to Notes. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/common_applications_calendar:12.1.1|oracle/common_applications_calendar:12.1.2|oracle/common_applications_calendar:12.1.3|oracle/common_applications_calendar:12.2.3|oracle/common_applications_calendar:12.2.4|oracle/common_applications_calendar:12.2.5 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/91839|http://www.securitytracker.com/id/1036403|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Unknown | Unknown | 95.0 | CRITICAL | oracle/common_applications_calendar | False | Unknown | nan |
CVE-2016-3543 | Unspecified vulnerability in the Oracle Common Applications Calendar component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect confidentiality and integrity via vectors related to Tasks. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/common_applications_calendar:12.1.1|oracle/common_applications_calendar:12.1.2|oracle/common_applications_calendar:12.1.3|oracle/common_applications_calendar:12.2.3|oracle/common_applications_calendar:12.2.4|oracle/common_applications_calendar:12.2.5 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/91841|http://www.securitytracker.com/id/1036403|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Unknown | Unknown | 95.0 | CRITICAL | oracle/common_applications_calendar | False | Unknown | nan |
CVE-2016-3546 | Unspecified vulnerability in the Oracle Advanced Collections component in Oracle E-Business Suite 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect confidentiality and integrity via vectors related to Report JSPs. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/advanced_collections:12.1.1|oracle/advanced_collections:12.1.2|oracle/advanced_collections:12.1.3 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/91838|http://www.securitytracker.com/id/1036403|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Unknown | Unknown | 95.0 | CRITICAL | oracle/advanced_collections | False | Unknown | nan |
CVE-2016-3556 | Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to EM Integration. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/agile_product_lifecycle_management:9.3.4|oracle/agile_product_lifecycle_management:9.3.5 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/91941|http://www.securitytracker.com/id/1036402|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/agile_product_lifecycle_management | False | Unknown | nan |
CVE-2016-3586 | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to WLS Core Components, a different vulnerability than CVE-2016-3510. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/weblogic_server:10.3.6.0.0|oracle/weblogic_server:12.1.3.0.0|oracle/weblogic_server:12.2.1.0.0 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/92016|http://www.securitytracker.com/id/1036373|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/weblogic_server | False | Unknown | nan |
CVE-2016-3587 | Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/linux:6|oracle/linux:7|oracle/jdk:1.8.0|oracle/jdk:1.8.0|oracle/jre:1.8.0|oracle/jre:1.8.0 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html|http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.oracle.com/technet... | True | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Unknown | Unknown | 92.0 | CRITICAL | oracle/linux | False | Unknown | nan |
CVE-2016-3598 | Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/jdk:1.8.0|oracle/jdk:1.8.0|oracle/jre:1.8.0|oracle/jre:1.8.0|oracle/linux:5.0|oracle/linux:6|oracle/linux:7 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html|http://lists.opensus... | True | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Unknown | Unknown | 92.0 | CRITICAL | oracle/jdk | False | Unknown | nan |
CVE-2016-3606 | Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/linux:5.0|oracle/linux:6.0|oracle/linux:7.0|oracle/jdk:1.7.0|oracle/jdk:1.8.0|oracle/jdk:1.8.0|oracle/jre:1.7.0|oracle/jre:1.8.0|oracle/jre:1.8.0 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html|http://lists.opensus... | True | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Unknown | Unknown | 92.0 | CRITICAL | oracle/linux | False | Unknown | nan |
CVE-2016-3607 | Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 3.0.1 and 3.1.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Web Container. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/glassfish_server:3.0.1|oracle/glassfish_server:3.1.2 | http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securitytracker.com/id/1036371|http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/glassfish_server | False | Unknown | nan |
CVE-2016-3609 | Unspecified vulnerability in the OJVM component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/database:11.2.0.4|oracle/database:12.1.0.1|oracle/database:12.1.0.2 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/91890|http://www.securitytracker.com/id/1036363|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.0 | CRITICAL | NETWORK | LOW | LOW | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.3 | 6.0 | Unknown | Unknown | 86.5 | CRITICAL | oracle/database | False | Unknown | nan |
CVE-2016-3610 | Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/jdk:1.8.0|oracle/jdk:1.8.0|oracle/jre:1.8.0|oracle/jre:1.8.0|oracle/linux:5.0|oracle/linux:6|oracle/linux:7 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html|http://lists.opensus... | True | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Unknown | Unknown | 92.0 | CRITICAL | oracle/jdk | False | Unknown | nan |
CVE-2016-3613 | Unspecified vulnerability in the Oracle Secure Global Desktop component in Oracle Virtualization 4.63, 4.71, and 5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to OpenSSL. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/secure_global_desktop:4.63|oracle/secure_global_desktop:4.71|oracle/secure_global_desktop:5.2 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/91856|http://www.securitytracker.com/id/1036391|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/secure_global_desktop | False | Unknown | nan |
CVE-2016-5453 | Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to IPMI. | 2016-07-21 | 2026-05-06 | UNKNOWN | oracle/integrated_lights_out_manager_firmware:3.0|oracle/integrated_lights_out_manager_firmware:3.1|oracle/integrated_lights_out_manager_firmware:3.2 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html|http://www.securityfocus.com/bid/91787|http://www.securityfocus.com/bid/92014|http://www.securitytracker.com/id/1036408|http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | oracle/integrated_lights_out_manager_firmware | False | Unknown | nan |
CVE-2016-4598 | QuickTime in Apple OS X before 10.11.6 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image. | 2016-07-22 | 2026-05-06 | CWE-119 | apple/mac_os_x:* | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://www.securityfocus.com/bid/91824|http://www.securitytracker.com/id/1036348|https://support.apple.com/HT206903|http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | apple/mac_os_x | False | Unknown | nan |
CVE-2016-4607 | libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | 2016-07-22 | 2026-05-06 | CWE-119 | xmlsoft/libxslt:*|apple/iphone_os:*|apple/mac_os_x:*|apple/tvos:*|apple/watchos:*|apple/icloud:*|apple/itunes:*|fedoraproject/fedora:30 | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html|http://lists.apple.com/archi... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | xmlsoft/libxslt | False | Unknown | nan |
CVE-2016-4608 | libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | 2016-07-22 | 2026-05-06 | CWE-119 | xmlsoft/libxslt:*|apple/icloud:*|apple/itunes:*|fedoraproject/fedora:30 | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html|http://lists.apple.com/archi... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | xmlsoft/libxslt | False | Unknown | nan |
CVE-2016-4609 | libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | 2016-07-22 | 2026-05-06 | CWE-119 | xmlsoft/libxslt:*|apple/iphone_os:*|apple/mac_os_x:*|apple/tvos:*|apple/watchos:*|apple/icloud:*|apple/itunes:*|fedoraproject/fedora:30|debian/debian_linux:8.0 | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html|http://lists.apple.com/archi... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | xmlsoft/libxslt | False | Unknown | nan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.