cve_id stringlengths 13 16 ⌀ | description stringlengths 34 2.67k ⌀ | published_date stringdate 1999-03-01 00:00:00 2018-08-06 00:00:00 ⌀ | last_modified stringdate 2024-11-21 00:00:00 2026-05-06 00:00:00 ⌀ | cwe_ids stringclasses 347
values | affected_products stringlengths 7 639 ⌀ | reference_urls stringlengths 49 643 ⌀ | exploit_available stringclasses 2
values | cvss_score stringclasses 35
values | cvss_severity stringclasses 4
values | attack_vector stringclasses 3
values | attack_complexity stringclasses 2
values | privileges_required stringclasses 3
values | user_interaction stringclasses 2
values | scope stringclasses 2
values | confidentiality_impact stringclasses 3
values | integrity_impact stringclasses 3
values | availability_impact stringclasses 3
values | exploitability_score stringclasses 12
values | impact_score stringclasses 15
values | attack_type stringclasses 33
values | likely_mitre_tactic stringclasses 7
values | risk_score stringclasses 58
values | risk_level stringclasses 4
values | primary_vendor_product stringlengths 5 107 ⌀ | in_cisa_kev stringclasses 2
values | ransomware_use stringclasses 2
values | kev_required_action stringclasses 7
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2016-4610 | libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | 2016-07-22 | 2026-05-06 | CWE-119 | xmlsoft/libxslt:*|apple/icloud:*|apple/itunes:*|fedoraproject/fedora:30|debian/debian_linux:8.0 | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html|http://lists.apple.com/archi... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | xmlsoft/libxslt | False | Unknown | nan |
CVE-2016-4614 | libxml2 in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | 2016-07-22 | 2026-05-06 | CWE-787 | apple/icloud:*|apple/itunes:*|apple/iphone_os:*|apple/mac_os_x:*|apple/tvos:*|apple/watchos:* | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html|http://lists.apple.com/archi... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Out-of-Bounds Write | Execution | 98.5 | CRITICAL | apple/icloud | False | Unknown | nan |
CVE-2016-4615 | libxml2 in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | 2016-07-22 | 2026-05-06 | CWE-119 | apple/iphone_os:*|apple/mac_os_x:*|apple/tvos:*|apple/watchos:*|apple/icloud:*|apple/itunes:* | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html|http://lists.apple.com/archi... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | apple/iphone_os | False | Unknown | nan |
CVE-2016-4616 | libxml2 in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | 2016-07-22 | 2026-05-06 | CWE-119 | apple/iphone_os:*|apple/mac_os_x:*|apple/tvos:*|apple/watchos:*|apple/icloud:*|apple/itunes:* | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html|http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html|http://lists.apple.com/archi... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | apple/iphone_os | False | Unknown | nan |
CVE-2016-4629 | ImageIO in Apple OS X before 10.11.6 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted xStride and yStride values in an EXR image. | 2016-07-22 | 2026-05-06 | CWE-119 | apple/mac_os_x:* | http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html|http://www.securityfocus.com/bid/91824|http://www.securitytracker.com/id/1036348|http://www.talosintelligence.com/reports/TALOS-2016-0180/|https://github.com/openexr/openexr/issues/563 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | apple/mac_os_x | False | Unknown | nan |
CVE-2016-5743 | Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and... | 2016-07-22 | 2026-05-06 | CWE-20 | siemens/simatic_batch:*|siemens/simatic_wincc:*|siemens/simatic_wincc:*|siemens/simatic_openpcs_7:*|siemens/simatic_openpcs_7:* | http://www.securityfocus.com/bid/92112|http://www.securitytracker.com/id/1036441|http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf|https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01|http://www.securityfocus.com/bid/92112 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | siemens/simatic_batch | False | Unknown | nan |
CVE-2016-1706 | The PPAPI implementation in Google Chrome before 52.0.2743.82 does not validate the origin of IPC messages to the plugin broker process that should have come from the browser process, which allows remote attackers to bypass a sandbox protection mechanism via an unexpected message type, related to broker_process_dispatc... | 2016-07-23 | 2026-05-06 | CWE-20 | google/chrome:* | http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html|http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html|http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html|http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html|http://lists.opensu... | False | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Improper Input Validation | Unknown | 77.0 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-6288 | The php_url_parse_ex function in ext/standard/url.c in PHP before 5.5.38 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via vectors involving the smart_str data type. | 2016-07-25 | 2026-05-06 | CWE-119 | php/php:* | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=629e4da7cc8b174acdeab84969cbfc606a019b31|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://openwall.com/lists/oss-security/2016/07/24/2|http://php.net/ChangeLog-5.php|http://rhn.redhat.com/errata/RHSA-2016-2750.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-6290 | ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization. | 2016-07-25 | 2026-05-06 | CWE-416 | php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=3798eb6fd5dddb211b01d41495072fd9858d4e32|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://openwall.com/lists/oss-security/2016/07/24/2|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-6291 | The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds array access and memory corruption), obtain sensitive information from process memory, or possibly have unspecified other impa... | 2016-07-25 | 2026-05-06 | CWE-119 | php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=eebcbd5de38a0f1c2876035402cb770e37476519|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://openwall.com/lists/oss-security/2016/07/24/2|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-6293 | The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspec... | 2016-07-25 | 2026-05-06 | CWE-119 | icu-project/international_components_for_unicode:* | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4|http://openwall.com/lists/oss-security/2016/07/24/2|http://www.securityfocus.com/bid/92127|https://bugs.php.net/72533|https://security.gentoo.org/glsa/201701-58 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | icu-project/international_components_for_unicode | False | Unknown | nan |
CVE-2016-6294 | The locale_accept_from_http function in ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unsp... | 2016-07-25 | 2026-05-06 | CWE-125 | php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://openwall.com/lists/oss-security/2016/07/24/2|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Out-of-Bounds Read | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-6295 | ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via crafted seriali... | 2016-07-25 | 2026-05-06 | CWE-416 | php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=cab1c3b3708eead315e033359d07049b23b147a3|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://openwall.com/lists/oss-security/2016/07/24/2|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-6296 | Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first... | 2016-07-25 | 2026-05-06 | CWE-119 | php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e6c48213c22ed50b2b987b479fcc1ac709394caa|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://openwall.com/lists/oss-security/2016/07/24/2|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-4522 | SQL injection vulnerability in Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | 2016-07-28 | 2026-05-06 | CWE-89 | rockwellautomation/factorytalk_energrymetrix:* | http://www.securityfocus.com/bid/92135|https://ics-cert.us-cert.gov/advisories/ICSA-16-173-03|http://www.securityfocus.com/bid/92135|https://ics-cert.us-cert.gov/advisories/ICSA-16-173-03 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | rockwellautomation/factorytalk_energrymetrix | False | Unknown | nan |
CVE-2016-4373 | The AdminUI in HPE Operations Manager (OM) before 9.21.130 on Linux, Unix, and Solaris allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library. | 2016-08-01 | 2026-05-06 | CWE-284 | hp/operations_manager:*|hp/operations_manager:*|hp/operations_manager:*|hp/operations_manager:9.20.0|hp/operations_manager:9.20.0|hp/operations_manager:9.20.0 | http://www.securityfocus.com/bid/92122|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05206507|http://www.securityfocus.com/bid/92122|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05206507 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | hp/operations_manager | False | Unknown | nan |
CVE-2016-4837 | SQL injection vulnerability in the Seed Coupon plugin before 1.6 for EC-CUBE allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | 2016-08-01 | 2026-05-06 | CWE-89 | ec-cube/discount_coupon:* | http://jvn.jp/en/jp/JVN40696431/index.html|http://jvndb.jvn.jp/jvndb/JVNDB-2016-000130|http://www.ec-cube.net/products/detail.php?product_id=493|http://www.securityfocus.com/bid/92090|http://jvn.jp/en/jp/JVN40696431/index.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | ec-cube/discount_coupon | False | Unknown | nan |
CVE-2016-3737 | The server in Red Hat JBoss Operations Network (JON) before 3.3.6 allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization. | 2016-08-02 | 2026-05-06 | CWE-20 | redhat/jboss_operations_network:* | http://rhn.redhat.com/errata/RHSA-2016-1519.html|http://www.securitytracker.com/id/1036507|https://bugzilla.redhat.com/show_bug.cgi?id=1333618|https://www.tenable.com/security/research/tra-2016-22|http://rhn.redhat.com/errata/RHSA-2016-1519.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | redhat/jboss_operations_network | False | Unknown | nan |
CVE-2016-5229 | Atlassian Bamboo before 5.11.4.1 and 5.12.x before 5.12.3.1 does not properly restrict permitted deserialized classes, which allows remote attackers to execute arbitrary code via vectors related to XStream Serialization. | 2016-08-02 | 2026-05-06 | CWE-284 | atlassian/bamboo:*|atlassian/bamboo:5.12.0|atlassian/bamboo:5.12.1|atlassian/bamboo:5.12.2 | http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html|http://www.securityfocus.com/archive/1/539003/100/0/threaded|http://www.securityfocus.com/bid/92057|https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-07-20-831660461.html|https://jira.atlassian.com/browse/BAM-17736 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | atlassian/bamboo | False | Unknown | nan |
CVE-2016-6178 | Huawei NE40E and CX600 devices with software before V800R007SPH017; PTN 6900-2-M8 devices with software before V800R007SPH019; NE5000E devices with software before V800R006SPH018; and CloudEngine devices 12800 with software before V100R003SPH010 and V100R005 before V100R005SPH006 allow remote attackers with control pla... | 2016-08-02 | 2026-05-06 | CWE-20 | huawei/ne5000e_firmware:v800r006c00|huawei/cloudengine_12800_firmware:v100r003c00|huawei/cloudengine_12800_firmware:v100r003c10|huawei/cloudengine_12800_firmware:v100r005c00|huawei/cloudengine_12800_firmware:v100r005c10|huawei/ptn_6900-2-m8_firmware:v800r007c00|huawei/cx600_firmware:v600r008c20|huawei/cx600_firmware:v8... | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160713-01-multicast-ldp-fec-stack-en|http://www.securityfocus.com/bid/91772|http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160713-01-multicast-ldp-fec-stack-en|http://www.securityfocus.com/bid/91772 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | huawei/ne5000e_firmware | False | Unknown | nan |
CVE-2016-5640 | Directory traversal vulnerability in cgi-bin/rftest.cgi on Crestron AirMedia AM-100 devices with firmware before 1.4.0.13 allows remote attackers to execute arbitrary commands via a .. (dot dot) in the ATE_COMMAND parameter. | 2016-08-03 | 2026-05-06 | CWE-77 | crestron/airmedia_am-100_firmware:* | http://www.kb.cert.org/vuls/id/603047|http://www.securityfocus.com/bid/92216|https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2016-05-002.md|http://www.kb.cert.org/vuls/id/603047|http://www.securityfocus.com/bid/92216 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Command Injection | Execution | 98.5 | CRITICAL | crestron/airmedia_am-100_firmware | False | Unknown | nan |
CVE-2016-5666 | Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 rely on the client to perform authentication, which allows remote attackers to obtain access by setting the value of objresp.authenabled to 1. | 2016-08-03 | 2026-05-06 | UNKNOWN | crestron/dm-txrx-100-str_firmware:1.2866.00026 | http://www.kb.cert.org/vuls/id/974424|http://www.securityfocus.com/bid/92211|http://www.kb.cert.org/vuls/id/974424|http://www.securityfocus.com/bid/92211 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | crestron/dm-txrx-100-str_firmware | False | Unknown | nan |
CVE-2016-5667 | Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 allow remote attackers to bypass authentication via a direct request to a page other than index.html. | 2016-08-03 | 2026-05-06 | UNKNOWN | crestron/dm-txrx-100-str_firmware:1.2866.00026 | http://www.kb.cert.org/vuls/id/974424|http://www.securityfocus.com/bid/92211|http://www.kb.cert.org/vuls/id/974424|http://www.securityfocus.com/bid/92211 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | crestron/dm-txrx-100-str_firmware | False | Unknown | nan |
CVE-2016-5668 | Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 allow remote attackers to bypass authentication and change settings via a JSON API call. | 2016-08-03 | 2026-05-06 | UNKNOWN | crestron/dm-txrx-100-str_firmware:1.2866.00026 | http://www.kb.cert.org/vuls/id/974424|http://www.securityfocus.com/bid/92211|http://www.kb.cert.org/vuls/id/974424|http://www.securityfocus.com/bid/92211 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | crestron/dm-txrx-100-str_firmware | False | Unknown | nan |
CVE-2016-5669 | Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 use a hardcoded 0xb9eed4d955a59eb3 X.509 certificate from an OpenSSL Test Certification Authority, which makes it easier for remote attackers to conduct man-in-the-middle attacks against HTTPS sessions by leveraging the certificate's trust r... | 2016-08-03 | 2026-05-06 | UNKNOWN | crestron/dm-txrx-100-str_firmware:1.2866.00026 | http://www.kb.cert.org/vuls/id/974424|http://www.securityfocus.com/bid/92211|http://www.kb.cert.org/vuls/id/974424|http://www.securityfocus.com/bid/92211 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | crestron/dm-txrx-100-str_firmware | False | Unknown | nan |
CVE-2016-5670 | Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 have a hardcoded password of admin for the admin account, which makes it easier for remote attackers to obtain access via the web management interface. | 2016-08-03 | 2026-05-06 | CWE-255 | crestron/dm-txrx-100-str_firmware:1.2866.00026 | http://www.kb.cert.org/vuls/id/974424|http://www.securityfocus.com/bid/92211|http://www.kb.cert.org/vuls/id/974424|http://www.securityfocus.com/bid/92211 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | crestron/dm-txrx-100-str_firmware | False | Unknown | nan |
CVE-2016-5254 | Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection... | 2016-08-05 | 2026-05-06 | CWE-416 | mozilla/firefox:*|mozilla/firefox:45.1.0|mozilla/firefox:45.1.1|mozilla/firefox:45.2.0|mozilla/firefox:45.3.0|oracle/linux:5.0|oracle/linux:6|oracle/linux:7 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html|http://rhn.redhat.com/errata/RHSA-2016-1551.html|http://www.debian.org/security/2016/dsa-3640|http://www.mozilla.org/security/announce/2016/mfsa2016-70.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | mozilla/firefox | False | Unknown | nan |
CVE-2016-6138 | Directory traversal vulnerability in SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591. | 2016-08-05 | 2026-05-06 | CWE-22 | sap/trex:7.10 | http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html|http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review|http://seclists.org/fulldisclosure/2016/Aug/114|http://seclists.org/fulldisclosure/2016/Aug/86|http://www.securityfocus.com/bid/920... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Path Traversal | Defense Evasion | 98.5 | CRITICAL | sap/trex | False | Unknown | nan |
CVE-2016-6139 | SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591. | 2016-08-05 | 2026-05-06 | UNKNOWN | sap/trex:7.10 | http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html|http://seclists.org/fulldisclosure/2016/Aug/115|http://seclists.org/fulldisclosure/2016/Aug/87|http://www.securityfocus.com/bid/92063|https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | sap/trex | False | Unknown | nan |
CVE-2016-6140 | SAP TREX 7.10 Revision 63 allows remote attackers to write to arbitrary files via vectors related to RFC-Gateway, aka SAP Security Note 2203591. | 2016-08-05 | 2026-05-06 | CWE-284 | sap/trex:7.10 | http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html|http://seclists.org/fulldisclosure/2016/Aug/88|http://www.securityfocus.com/bid/92069|https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015|https://www.onapsis.com/research/security-advisories/sap-trex-arbit... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | sap/trex | False | Unknown | nan |
CVE-2016-6147 | An unspecified interface in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands with SIDadm privileges via unspecified vectors, aka SAP Security Note 2234226. | 2016-08-05 | 2026-05-06 | CWE-78 | sap/trex:7.10 | http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html|http://seclists.org/fulldisclosure/2016/Aug/94|http://www.securityfocus.com/bid/92066|https://www.onapsis.com/blog/analyzing-sap-security-notes-february-2016|https://www.onapsis.com/research/security-advisories/sap-trex-... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | OS Command Injection | Execution | 98.5 | CRITICAL | sap/trex | False | Unknown | nan |
CVE-2016-6150 | The multi-tenant database container feature in SAP HANA does not properly encrypt communications, which allows remote attackers to bypass intended access restrictions and possibly have unspecified other impact via unknown vectors, aka SAP Security Note 2233550. | 2016-08-05 | 2026-05-06 | CWE-284 | sap/hana:- | http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html|http://seclists.org/fulldisclosure/2016/Aug/96|http://www.securityfocus.com/bid/92064|https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf|https://www.onapsis.com/research/security... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | sap/hana | False | Unknown | nan |
CVE-2016-4999 | SQL injection vulnerability in the getStringParameterSQL method in main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java in Dashbuilder before 0.6.0.Beta1 allows remote attackers to execute arbitrary SQL commands via a data set lookup filter in the (1) Data Set Authoring or (2) Displayer editor UI. | 2016-08-05 | 2026-05-06 | CWE-89 | redhat/dashbuilder:*|redhat/jboss_bpm_suite:6.0.0|redhat/jboss_bpm_suite:6.0.1|redhat/jboss_bpm_suite:6.0.3|redhat/jboss_bpm_suite:6.1|redhat/jboss_bpm_suite:6.1.2|redhat/jboss_enterprise_brms_platform:5.0.0|redhat/jboss_enterprise_brms_platform:5.3.1|redhat/jboss_enterprise_brms_platform:6.0.0|redhat/jboss_enterprise_... | http://www.securityfocus.com/bid/91795|https://access.redhat.com/errata/RHSA-2016:1428|https://access.redhat.com/errata/RHSA-2016:1429|https://bugzilla.redhat.com/show_bug.cgi?id=1349990|https://github.com/dashbuilder/dashbuilder/commit/8574899e3b6455547b534f570b2330ff772e524b | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | redhat/dashbuilder | False | Unknown | nan |
CVE-2014-9902 | Buffer overflow in CORE/SYS/legacy/src/utils/src/dot11f.c in the Qualcomm Wi-Fi driver in Android before 2016-08-05 on Nexus 7 (2013) devices allows remote attackers to execute arbitrary code via a crafted Information Element (IE) in an 802.11 management frame, aka Android internal bug 28668638 and Qualcomm internal bu... | 2016-08-05 | 2026-05-06 | CWE-119 | google/android:* | http://source.android.com/security/bulletin/2016-08-01.html|http://www.securityfocus.com/bid/92223|https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=3b1c44a3a7129dc25abe2c23543f6f66c59e8f50|http://source.android.com/security/bulletin/2016-08-01.html|http://www.securityfocus.com... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3819 | Integer overflow in codecs/on2/h264dec/source/h264bsd_dpb.c in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka int... | 2016-08-05 | 2026-05-06 | CWE-119 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-08-01.html|http://www.securityfocus.com/bid/92228|https://android.googlesource.com/platform/frameworks/av/+/590d1729883f700ab905cdc9ad850f3ddd7e1f56|http://source.android.com/security/bulletin/2016-08-01.html|http://www.securityfocus.com/bid/92228 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3820 | The ih264d decoder in mediaserver in Android 6.x before 2016-08-01 mishandles slice numbers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 28673410. | 2016-08-05 | 2026-05-06 | CWE-119 | google/android:6.0|google/android:6.0.1 | http://source.android.com/security/bulletin/2016-08-01.html|http://www.securityfocus.com/bid/92228|https://android.googlesource.com/platform/external/libavc/+/a78887bcffbc2995cf9ed72e0697acf560875e9e|http://source.android.com/security/bulletin/2016-08-01.html|http://www.securityfocus.com/bid/92228 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3821 | libmedia in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 has certain incorrect declarations, which allows remote attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference or memory corruption) via a crafted media file, aka in... | 2016-08-05 | 2026-05-06 | CWE-476 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-08-01.html|http://www.securityfocus.com/bid/92228|https://android.googlesource.com/platform/frameworks/av/+/42a25c46b844518ff0d0b920c20c519e1417be69|http://source.android.com/security/bulletin/2016-08-01.html|http://www.securityfocus.com/bid/92228 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | NULL Pointer Dereference | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3840 | Conscrypt in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-05 does not properly identify session reuse, which allows remote attackers to execute arbitrary code via unspecified vectors, aka internal bug 28751153. | 2016-08-05 | 2026-05-06 | CWE-264 | google/android:4.0|google/android:4.0.1|google/android:4.0.2|google/android:4.0.3|google/android:4.0.4|google/android:4.1|google/android:4.1.2|google/android:4.2|google/android:4.2.1|google/android:4.2.2 | http://source.android.com/security/bulletin/2016-08-01.html|http://www.securityfocus.com/bid/92229|https://android.googlesource.com/platform/external/conscrypt/+/5af5e93463f4333187e7e35f3bd2b846654aa214|http://source.android.com/security/bulletin/2016-08-01.html|http://www.securityfocus.com/bid/92229 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3078 | Multiple integer overflows in php_zip.c in the zip extension in PHP before 7.0.6 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted call to (1) getFromIndex or (2) getFromName in the ZipArchive class. | 2016-08-07 | 2026-05-06 | CWE-190 | php/php:* | http://www.openwall.com/lists/oss-security/2016/04/28/1|http://www.securitytracker.com/id/1035701|https://bugs.php.net/bug.php?id=71923|https://github.com/php/php-src/commit/3b8d4de300854b3517c7acb239b84f7726c1353c?w=1|https://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-3132 | Double free vulnerability in the SplDoublyLinkedList::offsetSet function in ext/spl/spl_dllist.c in PHP 7.x before 7.0.6 allows remote attackers to execute arbitrary code via a crafted index. | 2016-08-07 | 2026-05-06 | CWE-415 | php/php:7.0.0|php/php:7.0.1|php/php:7.0.2|php/php:7.0.3|php/php:7.0.4|php/php:7.0.5 | http://github.com/php/php-src/commit/28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5?w=1|http://www.securityfocus.com/bid/92356|https://bugs.php.net/bug.php?id=71735|https://php.net/ChangeLog-7.php|https://security-tracker.debian.org/tracker/CVE-2016-3132 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-5114 | sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstr... | 2016-08-07 | 2026-05-06 | CWE-119|CWE-125 | php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php|http://rhn.redhat.com/errata/RHSA-2016-2750.html|http://www.openwall.com/lists/oss-security/2016/05/29/1 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | Buffer Overflow | Execution | 95.0 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-5116 | gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name. | 2016-08-07 | 2026-05-06 | CWE-119 | libgd/libgd:*|opensuse/leap:42.1|debian/debian_linux:8.0 | http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html|http://www.debian.org/security/2016/dsa-3619|http://www.openwall.com/lists/oss-security/2016/05/29/5|http://www.ubuntu.com/usn/USN-3030-1|https://github.com/libgd/libgd/commit/4dc1a2d7931017d3625f2d7cff70a17ce58b53b4 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | Buffer Overflow | Execution | 95.0 | CRITICAL | libgd/libgd | False | Unknown | nan |
CVE-2016-5768 | Double free vulnerability in the _php_mb_regex_ereg_replace_exec function in php_mbregex.c in the mbstring extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by leveraging a callback exception. | 2016-08-07 | 2026-05-06 | CWE-415 | php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html|http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html|http://php.net/ChangeLog-... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-5769 | Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) m... | 2016-08-07 | 2026-05-06 | CWE-190 | php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html|http://lists.op... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 83.5 | HIGH | php/php | False | Unknown | nan |
CVE-2016-5770 | Integer overflow in the SplFileObject::fread function in spl_directory.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer argument, a related issue to CVE-2016-5096. | 2016-08-07 | 2026-05-06 | CWE-190 | php/php:*|php/php:*|php/php:*|opensuse/leap:42.1|opensuse/opensuse:13.2|debian/debian_linux:8.0 | http://github.com/php/php-src/commit/7245bff300d3fa8bacbef7897ff080a6f1c23eba?w=1|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html|http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html|http://php.net/ChangeLog-... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-5771 | spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data. | 2016-08-07 | 2026-05-06 | CWE-416 | php/php:*|php/php:*|php/php:*|opensuse/leap:42.1|opensuse/opensuse:13.2|debian/debian_linux:8.0 | http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html|http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html|http://php.net/ChangeLog-... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-5772 | Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_de... | 2016-08-07 | 2026-05-06 | CWE-415 | php/php:*|php/php:*|php/php:*|suse/linux_enterprise_debuginfo:11|opensuse/leap:42.1|opensuse/opensuse:13.2|suse/linux_enterprise_server:11|suse/linux_enterprise_software_development_kit:11|debian/debian_linux:8.0 | http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html|http://lists.op... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-5773 | php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serializ... | 2016-08-07 | 2026-05-06 | CWE-416 | php/php:*|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0|php/php:5.6.0 | http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1|http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html|http://php.net/ChangeLog-5.php|http://php.net/ChangeLog-7.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-5140 | Heap-based buffer overflow in the opj_j2k_read_SQcd_SQcc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JPEG 2000 data. | 2016-08-07 | 2026-05-06 | CWE-119 | google/chrome:* | http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html|http://rhn.redhat.com/errata/RHSA-2016-1580.html|http://www.debian.org/security/20... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-5142 | The Web Cryptography API (aka WebCrypto) implementation in Blink, as used in Google Chrome before 52.0.2743.116, does not properly copy data buffers, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code, related to NormalizeAlg... | 2016-08-07 | 2026-05-06 | CWE-416 | google/chrome:* | http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html|http://rhn.redhat.com/errata/RHSA-2016-1580.html|http://www.debian.org/security/20... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-5143 | The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-201... | 2016-08-07 | 2026-05-06 | CWE-264 | google/chrome:* | http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html|http://rhn.redhat.com/errata/RHSA-2016-1580.html|http://www.debian.org/security/20... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-5144 | The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-201... | 2016-08-07 | 2026-05-06 | CWE-284 | google/chrome:* | http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html|http://rhn.redhat.com/errata/RHSA-2016-1580.html|http://www.debian.org/security/20... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2016-5146 | Multiple unspecified vulnerabilities in Google Chrome before 52.0.2743.116 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | 2016-08-07 | 2026-05-06 | UNKNOWN | google/chrome:* | http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html|http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html|http://rhn.redhat.com/errata/RHSA-2016-1580.html|http://www.debian.org/security/20... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/chrome | False | Unknown | nan |
CVE-2014-9410 | The vfe31_proc_general function in drivers/media/video/msm/vfe/msm_vfe31.c in the MSM-VFE31 driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate a certain id value, which allows attackers to gain privileges or cause a d... | 2016-08-07 | 2026-05-06 | CWE-20 | linux/linux_kernel:* | https://www.codeaurora.org/security-advisory/multiple-issues-in-camera-drivers-cve-2014-9410-cve-2015-0568|https://www.codeaurora.org/security-advisory/multiple-issues-in-camera-drivers-cve-2014-9410-cve-2015-0568 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 83.5 | HIGH | linux/linux_kernel | False | Unknown | nan |
CVE-2015-0573 | drivers/media/platform/msm/broadcast/tsc.c in the TSC driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via a crafte... | 2016-08-07 | 2026-05-06 | CWE-476 | linux/linux_kernel:* | https://us.codeaurora.org/cgit/quic/la//kernel/msm-3.10/commit/?id=e20f20aaed6b6d2fd1667bad9be9ef35103a51df|https://www.codeaurora.org/issues-tsc-tspp2-and-buspm-drivers-cve-2015-0573-cve-2016-2441-cve-2016-2442|https://us.codeaurora.org/cgit/quic/la//kernel/msm-3.10/commit/?id=e20f20aaed6b6d2fd1667bad9be9ef35103a51df|... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | NULL Pointer Dereference | Unknown | 98.5 | CRITICAL | linux/linux_kernel | False | Unknown | nan |
CVE-2016-5792 | SQL injection vulnerability in Moxa SoftCMS before 1.5 allows remote attackers to execute arbitrary SQL commands via unspecified fields. | 2016-08-08 | 2026-05-06 | CWE-89 | moxa/softcms:* | http://www.securityfocus.com/bid/92262|http://www.zerodayinitiative.com/advisories/ZDI-16-463|https://ics-cert.us-cert.gov/advisories/ICSA-16-215-01|http://www.securityfocus.com/bid/92262|http://www.zerodayinitiative.com/advisories/ZDI-16-463 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | moxa/softcms | False | Unknown | nan |
CVE-2016-3312 | ActiveSyncProvider in Microsoft Windows 10 Gold and 1511 allows attackers to discover credentials by leveraging failure of Universal Outlook to obtain a secure connection, aka "Universal Outlook Information Disclosure Vulnerability." | 2016-08-09 | 2026-05-06 | CWE-200 | microsoft/windows_10:-|microsoft/windows_10:-|microsoft/windows_10:1511|microsoft/windows_10:1511 | http://www.securityfocus.com/bid/92307|http://www.securitytracker.com/id/1036577|https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-103|http://www.securityfocus.com/bid/92307|http://www.securitytracker.com/id/1036577 | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Information Disclosure | Collection | 80.0 | HIGH | microsoft/windows_10 | False | Unknown | nan |
CVE-2016-5408 | Stack-based buffer overflow in the munge_other_line function in cachemgr.cgi in the squid package before 3.1.23-16.el6_8.6 in Red Hat Enterprise Linux 6 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-4051. | 2016-08-10 | 2026-05-06 | CWE-119 | oracle/linux:6|redhat/enterprise_linux_server:6.0|redhat/enterprise_linux_workstation:6.0 | http://rhn.redhat.com/errata/RHSA-2016-1573.html|http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html|http://rhn.redhat.com/errata/RHSA-2016-1573.html|http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | oracle/linux | False | Unknown | nan |
CVE-2014-9906 | Use-after-free vulnerability in DBD::mysql before 4.029 allows attackers to cause a denial of service (program crash) or possibly execute arbitrary code via vectors related to a lost server connection. | 2016-08-19 | 2026-05-06 | CWE-416 | debian/debian_linux:8.0|dbd-mysql_project/dbd-mysql:* | http://cpansearch.perl.org/src/CAPTTOFU/DBD-mysql-4.029/ChangeLog|http://www.debian.org/security/2016/dsa-3635|http://www.openwall.com/lists/oss-security/2016/07/27/5|http://www.openwall.com/lists/oss-security/2016/07/27/6|http://www.securityfocus.com/bid/92149 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | debian/debian_linux | False | Unknown | nan |
CVE-2015-8949 | Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login. | 2016-08-19 | 2026-05-06 | CWE-416 | dbd-mysql_project/dbd-mysql:4.033|debian/debian_linux:8.0 | http://www.debian.org/security/2016/dsa-3635|http://www.openwall.com/lists/oss-security/2016/07/25/13|http://www.openwall.com/lists/oss-security/2016/07/27/1|http://www.securityfocus.com/bid/92118|https://blog.fuzzing-project.org/50-Use-after-free-in-my_login-function-of-DBDmysql-Perl-module.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | dbd-mysql_project/dbd-mysql | False | Unknown | nan |
CVE-2016-6254 | Heap-based buffer overflow in the parse_packet function in network.c in collectd before 5.4.3 and 5.x before 5.5.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted network packet. | 2016-08-19 | 2026-05-06 | CWE-119 | debian/debian_linux:8.0|collectd/collectd:*|collectd/collectd:*|fedoraproject/fedora:23|fedoraproject/fedora:24 | http://collectd.org/news.shtml|http://www.debian.org/security/2016/dsa-3636|https://github.com/collectd/collectd/commit/b589096f907052b3a4da2b9ccc9b0e2e888dfc18|https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CM4W5SJ4OTBGINGIN4NJLXCUZAZANO6J/|https://lists.fedoraproject.... | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | HIGH | HIGH | 3.9 | 5.2 | Buffer Overflow | Execution | 95.0 | CRITICAL | debian/debian_linux | False | Unknown | nan |
CVE-2016-6493 | Citrix XenApp 6.x before 6.5 HRP07 and 7.x before 7.9 and Citrix XenDesktop before 7.9 might allow attackers to weaken an unspecified security mitigation via vectors related to memory permission. | 2016-08-19 | 2026-05-06 | CWE-254 | citrix/xenapp:6.0.0.0|citrix/xenapp:6.5.0.0|citrix/xenapp:7.0.0.0|citrix/xenapp:7.1.0.0|citrix/xenapp:7.5.0.0|citrix/xenapp:7.6.0.0|citrix/xenapp:7.7.0.0|citrix/xenapp:7.8.0.0|citrix/xendesktop:* | http://support.citrix.com/article/CTX215460|http://www.securityfocus.com/bid/92316|http://www.securitytracker.com/id/1036539|http://support.citrix.com/article/CTX215460|http://www.securityfocus.com/bid/92316 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | citrix/xenapp | False | Unknown | nan |
CVE-2016-5817 | SQL injection vulnerability in news pages in Cargotec Navis WebAccess before 2016-08-10 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | 2016-08-22 | 2026-05-06 | CWE-89 | navis/webaccess:* | https://ics-cert.us-cert.gov/advisories/ICSA-16-231-01|https://ics-cert.us-cert.gov/advisories/ICSA-16-231-01 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 83.5 | HIGH | navis/webaccess | False | Unknown | nan |
CVE-2016-5081 | ZModo ZP-NE14-S and ZP-IBH-13W devices have a hardcoded root password, which makes it easier for remote attackers to obtain access via a TELNET session. | 2016-08-24 | 2026-05-06 | CWE-798 | zmodo/zp-ibh-13w:-|zmodo/zp-ne-14-s:- | http://www.kb.cert.org/vuls/id/301735|http://www.securityfocus.com/bid/92449|http://www.kb.cert.org/vuls/id/301735|http://www.securityfocus.com/bid/92449 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | zmodo/zp-ibh-13w | False | Unknown | nan |
CVE-2016-5799 | Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 do not properly restrict authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack. | 2016-08-24 | 2026-05-06 | CWE-285 | moxa/oncell_g3001_firmware:*|moxa/oncell_g3100v2_firmware:* | http://www.securityfocus.com/bid/92606|https://ics-cert.us-cert.gov/advisories/ICSA-16-236-01|http://www.securityfocus.com/bid/92606|https://ics-cert.us-cert.gov/advisories/ICSA-16-236-01 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | moxa/oncell_g3001_firmware | False | Unknown | nan |
CVE-2016-6909 | Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3 allows remote attackers to execute arbitrary code via a crafted HTTP request, aka EGREGIOUSBLUNDER. | 2016-08-24 | 2026-05-06 | CWE-119 | fortinet/fortios:*|fortinet/fortios:*|fortinet/fortios:*|fortinet/fortiswitch:* | http://fortiguard.com/advisory/FG-IR-16-023|http://packetstormsecurity.com/files/138387/EGREGIOUSBLUNDER-Fortigate-Remote-Code-Execution.html|http://www.securityfocus.com/bid/92523|http://www.securitytracker.com/id/1036643|https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | fortinet/fortios | False | Unknown | nan |
CVE-2016-5681 | Stack-based buffer overflow in dws/api/Login on D-Link DIR-850L B1 2.07 before 2.07WWB05, DIR-817 Ax, DIR-818LW Bx before 2.05b03beta03, DIR-822 C1 3.01 before 3.01WWb02, DIR-823 A1 1.00 before 1.00WWb05, DIR-895L A1 1.11 before 1.11WWb04, DIR-890L A1 1.09 before 1.09b14, DIR-885L A1 1.11 before 1.11WWb07, DIR-880L A1 ... | 2016-08-25 | 2026-05-06 | CWE-119 | dlink/dir-868l_firmware:*|dlink/dir-822_firmware:3.01|d-link/dir-880l_firmware:*|d-link/dir-850l_firmare:*|d-link/dir-895l_firmware:*|d-link/dir-817l\(w\)_firmware:*|d-link/dir-818l\(w\)_firmware:*|d-link/dir-890l_firmware:*|d-link/dir-823_firmware:*|d-link/dir-885l_firmware:* | http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10063|http://www.kb.cert.org/vuls/id/332115|http://www.securityfocus.com/bid/92427|http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10063|http://www.kb.cert.org/vuls/id/332115 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | dlink/dir-868l_firmware | False | Unknown | nan |
CVE-2016-4119 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-08-26 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | https://blog.fortinet.com/2016/06/06/analysis-of-use-after-free-vulnerability-cve-2016-4119-in-adobe-acrobat-and-reader|https://helpx.adobe.com/security/products/acrobat/apsb16-14.html|https://blog.fortinet.com/2016/06/06/analysis-of-use-after-free-vulnerability-cve-2016-4119-in-adobe-acrobat-and-reader|https://helpx.a... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4265 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-08-26 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/92640|http://www.zerodayinitiative.com/advisories/ZDI-16-488|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/92640|http://www.zerodayinitiative.com/advisories/ZDI-16-488 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4266 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-08-26 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/92636|http://www.zerodayinitiative.com/advisories/ZDI-16-489|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/92636|http://www.zerodayinitiative.com/advisories/ZDI-16-489 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4267 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-08-26 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/92637|http://www.zerodayinitiative.com/advisories/ZDI-16-490|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/92637|http://www.zerodayinitiative.com/advisories/ZDI-16-490 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4268 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-08-26 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/92643|http://www.zerodayinitiative.com/advisories/ZDI-16-492|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/92643|http://www.zerodayinitiative.com/advisories/ZDI-16-492 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4269 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-08-26 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:*|adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:* | http://www.securityfocus.com/bid/92641|http://www.zerodayinitiative.com/advisories/ZDI-16-491|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/92641|http://www.zerodayinitiative.com/advisories/ZDI-16-491 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-4270 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-08-26 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/92635|http://www.zerodayinitiative.com/advisories/ZDI-16-493|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/92635|http://www.zerodayinitiative.com/advisories/ZDI-16-493 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/acrobat | False | Unknown | nan |
CVE-2016-5048 | SQL injection vulnerability in chat/staff/default.aspx in ReadyDesk 9.1 allows remote attackers to execute arbitrary SQL commands via the user name field. | 2016-08-26 | 2026-05-06 | CWE-89 | readydesk/readydesk:9.1 | http://www.kb.cert.org/vuls/id/294272|http://www.securityfocus.com/bid/92487|http://www.kb.cert.org/vuls/id/294272|http://www.securityfocus.com/bid/92487 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | readydesk/readydesk | False | Unknown | nan |
CVE-2016-5050 | Unrestricted file upload vulnerability in chat/sendfile.aspx in ReadyDesk 9.1 allows remote attackers to execute arbitrary code by uploading and requesting a .aspx file. | 2016-08-26 | 2026-05-06 | CWE-434 | readydesk/readydesk:9.1 | http://www.kb.cert.org/vuls/id/294272|http://www.securityfocus.com/bid/92487|http://www.kb.cert.org/vuls/id/294272|http://www.securityfocus.com/bid/92487 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unrestricted File Upload | Initial Access | 98.5 | CRITICAL | readydesk/readydesk | False | Unknown | nan |
CVE-2016-5344 | Multiple integer overflows in the MDSS driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service or possibly have unspecified other impact via a large size value, related to mdss_compat_utils.c, md... | 2016-08-30 | 2026-05-06 | CWE-190 | google/android:*|linux/linux_kernel:* | http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/92695|https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=1d2297267c24f2c44bd0ecb244ddb8bc880a29b7|https://www.codeaurora.org/integer-overflow-mdss-driver-cve-2016-5344|http://source.android.com/security/bulletin/2... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | google/android | False | Unknown | nan |
CVE-2016-7115 | Buffer overflow in the handle_packet function in mactelnet.c in the client in MAC-Telnet 0.4.3 and earlier allows remote TELNET servers to execute arbitrary code via a long string in an MT_CPTYPE_PASSSALT control packet. | 2016-08-30 | 2026-05-06 | CWE-119 | mac-telnet_project/mac-telnet:* | http://www.securityfocus.com/bid/92699|https://github.com/haakonnessjoen/MAC-Telnet/commit/b69d11727d4f0f8cf719c79e3fb700f55ca03e9a|https://github.com/haakonnessjoen/MAC-Telnet/pull/20|http://www.securityfocus.com/bid/92699|https://github.com/haakonnessjoen/MAC-Telnet/commit/b69d11727d4f0f8cf719c79e3fb700f55ca03e9a | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | mac-telnet_project/mac-telnet | False | Unknown | nan |
CVE-2016-6195 | SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin before 4.2.2 Patch Level 5 and 4.2.3 before Patch Level 1 allows remote attackers to execute arbitrary SQL commands via the postids parameter to forumrunner/request.php, as exploited in the wild in July 2016. | 2016-08-30 | 2026-05-06 | CWE-89 | vbulletin/vbulletin:*|vbulletin/vbulletin:4.2.3 | http://www.securityfocus.com/bid/92687|http://www.vbulletin.org/forum/showthread.php?t=322848|https://enumerated.wordpress.com/2016/07/11/1/|https://github.com/drewlong/vbully|http://www.securityfocus.com/bid/92687 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | vbulletin/vbulletin | False | Unknown | nan |
CVE-2016-5333 | VMware Photos OS OVA 1.0 before 2016-08-14 has a default SSH public key in an authorized_keys file, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key. | 2016-08-31 | 2026-05-06 | CWE-798 | vmware/photon_os:* | http://www.securityfocus.com/bid/92474|http://www.securitytracker.com/id/1036628|http://www.theregister.co.uk/2016/08/16/vmware_shipped_public_key_with_its_photon_osforcontainers/|http://www.vmware.com/security/advisories/VMSA-2016-0012.html|http://www.securityfocus.com/bid/92474 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 83.5 | HIGH | vmware/photon_os | False | Unknown | nan |
CVE-2016-5336 | VMware vRealize Automation 7.0.x before 7.1 allows remote attackers to execute arbitrary code via unspecified vectors. | 2016-08-31 | 2026-05-06 | UNKNOWN | vmware/vrealize_automation:7.0|vmware/vrealize_automation:7.0.1 | http://www.securityfocus.com/bid/92607|http://www.securitytracker.com/id/1036685|http://www.vmware.com/security/advisories/VMSA-2016-0013.html|http://www.securityfocus.com/bid/92607|http://www.securitytracker.com/id/1036685 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | vmware/vrealize_automation | False | Unknown | nan |
CVE-2016-5674 | __debugging_center_utils___.php in NUUO NVRmini 2 1.7.5 through 3.0.0, NUUO NVRsolo 1.7.5 through 3.0.0, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to execute arbitrary PHP code via the log parameter. | 2016-08-31 | 2026-05-06 | CWE-20 | netgear/readynas_surveillance:1.1.1|netgear/readynas_surveillance:1.1.2|netgear/readynas_surveillance:1.2.0.4|netgear/readynas_surveillance:1.3.2.4|netgear/readynas_surveillance:1.3.2.14|netgear/readynas_surveillance:1.4.0|netgear/readynas_surveillance:1.4.1|netgear/readynas_surveillance:1.4.2|nuuo/nvrmini_2:1.7.5|nuuo... | http://www.kb.cert.org/vuls/id/856152|http://www.securityfocus.com/bid/92318|https://www.exploit-db.com/exploits/40200/|http://www.kb.cert.org/vuls/id/856152|http://www.securityfocus.com/bid/92318 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | netgear/readynas_surveillance | False | Unknown | nan |
CVE-2016-5675 | handle_daylightsaving.php in NUUO NVRmini 2 1.7.5 through 3.0.0, NUUO NVRsolo 1.0.0 through 3.0.0, NUUO Crystal 2.2.1 through 3.2.0, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to execute arbitrary PHP code via the NTPServer parameter. | 2016-08-31 | 2026-05-06 | CWE-20 | netgear/readynas_surveillance:1.1.1|netgear/readynas_surveillance:1.1.2|netgear/readynas_surveillance:1.2.0.4|netgear/readynas_surveillance:1.3.2.4|netgear/readynas_surveillance:1.3.2.14|netgear/readynas_surveillance:1.4.0|netgear/readynas_surveillance:1.4.1|netgear/readynas_surveillance:1.4.2|nuuo/crystal:2.2.1|nuuo/c... | http://www.kb.cert.org/vuls/id/856152|http://www.securityfocus.com/bid/92318|https://www.exploit-db.com/exploits/40200/|http://www.kb.cert.org/vuls/id/856152|http://www.securityfocus.com/bid/92318 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | netgear/readynas_surveillance | False | Unknown | nan |
CVE-2016-5678 | NUUO NVRmini 2 1.0.0 through 3.0.0 and NUUO NVRsolo 1.0.0 through 3.0.0 have hardcoded root credentials, which allows remote attackers to obtain administrative access via unspecified vectors. | 2016-08-31 | 2026-05-06 | CWE-798 | nuuo/nvrmini_2:1.0.0|nuuo/nvrmini_2:1.1.0|nuuo/nvrmini_2:1.3.0|nuuo/nvrmini_2:1.3.2|nuuo/nvrmini_2:1.4.0|nuuo/nvrmini_2:1.5.1|nuuo/nvrmini_2:1.5.2|nuuo/nvrmini_2:1.6.0|nuuo/nvrmini_2:1.6.1|nuuo/nvrmini_2:1.6.2 | http://www.kb.cert.org/vuls/id/856152|http://www.securityfocus.com/bid/92318|https://www.exploit-db.com/exploits/40200/|http://www.kb.cert.org/vuls/id/856152|http://www.securityfocus.com/bid/92318 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | nuuo/nvrmini_2 | False | Unknown | nan |
CVE-2016-1473 | Cisco Small Business 220 devices with firmware before 1.0.1.1 have a hardcoded SNMP community, which allows remote attackers to read or modify SNMP objects by leveraging knowledge of this community, aka Bug ID CSCuz76216. | 2016-09-02 | 2026-05-06 | CWE-200 | cisco/small_business_220_series_smart_plus_switches:1.0.0.17|cisco/small_business_220_series_smart_plus_switches:1.0.0.18|cisco/small_business_220_series_smart_plus_switches:1.0.0.19 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-sps3|http://www.securityfocus.com/bid/92710|http://www.securitytracker.com/id/1036711|http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_default_snmp.pdf|http://tools.cisco.com/security/center/content/CiscoSecurityAdvi... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Information Disclosure | Collection | 98.5 | CRITICAL | cisco/small_business_220_series_smart_plus_switches | False | Unknown | nan |
CVE-2016-5636 | Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow. | 2016-09-02 | 2026-05-06 | CWE-190 | python/python:3.0|python/python:3.0.1|python/python:3.1.0|python/python:3.1.1|python/python:3.1.2|python/python:3.1.3|python/python:3.1.4|python/python:3.1.5|python/python:3.2.0|python/python:3.2.1 | http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html|http://rhn.redhat.com/errata/RHSA-2016-2586.html|http://www.openwall.com/lists/oss-security/2016/06/15/15|http://www.openwall.com/lists/oss-security/2016/06/16/1|http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 83.5 | HIGH | python/python | False | Unknown | nan |
CVE-2015-5719 | app/Controller/TemplatesController.php in Malware Information Sharing Platform (MISP) before 2.3.92 does not properly restrict filenames under the tmp/files/ directory, which has unspecified impact and attack vectors. | 2016-09-03 | 2026-05-06 | UNKNOWN | misp-project/malware_information_sharing_platform:* | http://www.securityfocus.com/bid/92740|https://github.com/MISP/MISP/commit/27cc167c3355ec76292235d7f5f4e0016bfd7699|https://www.circl.lu/advisory/CVE-2015-5719/|http://www.securityfocus.com/bid/92740|https://github.com/MISP/MISP/commit/27cc167c3355ec76292235d7f5f4e0016bfd7699 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | misp-project/malware_information_sharing_platform | False | Unknown | nan |
CVE-2015-5721 | Malware Information Sharing Platform (MISP) before 2.3.90 allows remote attackers to conduct PHP object injection attacks via crafted serialized data, related to TemplatesController.php and populate_event_from_template_attributes.ctp. | 2016-09-03 | 2026-05-06 | CWE-94 | misp-project/malware_information_sharing_platform:* | http://www.securityfocus.com/bid/92739|https://github.com/MISP/MISP/commit/415d85102d5aa5f96f4f11a17c86b59bb9cc0d56|https://www.circl.lu/advisory/CVE-2015-5721/|http://www.securityfocus.com/bid/92739|https://github.com/MISP/MISP/commit/415d85102d5aa5f96f4f11a17c86b59bb9cc0d56 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Code Injection | Execution | 98.5 | CRITICAL | misp-project/malware_information_sharing_platform | False | Unknown | nan |
CVE-2016-7112 | A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Etherne... | 2016-09-06 | 2026-05-06 | CWE-287 | siemens/en100_ethernet_module_firmware:* | http://www.securityfocus.com/bid/92747|http://www.securityfocus.com/bid/99471|http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-630413.pdf|https://ics-cert.us-cert.gov/advisories/ICSA-17-187-03|https://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-323211.pdf | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 83.5 | HIGH | siemens/en100_ethernet_module_firmware | False | Unknown | nan |
CVE-2016-5022 | F5 BIG-IP LTM, Analytics, APM, ASM, and Link Controller 11.2.x before 11.2.1 HF16, 11.3.x, 11.4.x, 11.5.x before 11.5.4 HF2, 11.6.x before 11.6.1 HF1, and 12.x before 12.0.0 HF3; BIG-IP AAM, AFM, and PEM 11.4.x, 11.5.x before 11.5.4 HF2, 11.6.x before 11.6.1 HF1, and 12.x before 12.0.0 HF3; BIG-IP DNS 12.x before 12.0.... | 2016-09-07 | 2026-05-06 | CWE-284 | f5/big-ip_link_controller:11.2.0|f5/big-ip_link_controller:11.2.1|f5/big-ip_link_controller:11.3.0|f5/big-ip_link_controller:11.4.0|f5/big-ip_link_controller:11.4.1|f5/big-ip_link_controller:11.5.0|f5/big-ip_link_controller:11.5.1|f5/big-ip_link_controller:11.5.2|f5/big-ip_link_controller:11.5.3|f5/big-ip_link_controll... | http://www.securitytracker.com/id/1036709|http://www.securitytracker.com/id/1036710|https://support.f5.com/kb/en-us/solutions/public/k/06/sol06045217.html|http://www.securitytracker.com/id/1036709|http://www.securitytracker.com/id/1036710 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | f5/big-ip_link_controller | False | Unknown | nan |
CVE-2016-6825 | Huawei XH620 V3, XH622 V3, and XH628 V3 servers with software before V100R003C00SPC610, RH1288 V3 servers with software before V100R003C00SPC613, RH2288 V3 servers with software before V100R003C00SPC617, and RH2288H V3 servers with software before V100R003C00SPC515 allow remote attackers to obtain passwords via a brute... | 2016-09-07 | 2026-05-06 | CWE-285 | huawei/rh1288_v3_server_firmware:v100r003c00|huawei/rh2288_v3_server_firmware:v100r003c00|huawei/rh2288h_v3_server_firmware:v100r003c00|huawei/xh620_v3_server_firmware:v100r003c00|huawei/xh622_v3_server_firmware:v100r003c00|huawei/xh628_v3_server_firmware:v100r003c00 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160817-01-server-en|http://www.securityfocus.com/bid/92504|http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160817-01-server-en|http://www.securityfocus.com/bid/92504 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | huawei/rh1288_v3_server_firmware | False | Unknown | nan |
CVE-2016-7109 | Huawei Unified Maintenance Audit (UMA) before V200R001C00SPC200 allows remote attackers to execute arbitrary commands via "special characters," a different vulnerability than CVE-2016-7110. | 2016-09-07 | 2026-05-06 | CWE-94 | huawei/uma:* | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-uma-en|http://www.securityfocus.com/bid/92617|http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-uma-en|http://www.securityfocus.com/bid/92617 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Code Injection | Execution | 98.5 | CRITICAL | huawei/uma | False | Unknown | nan |
CVE-2016-7110 | Huawei Unified Maintenance Audit (UMA) before V200R001C00SPC200 allows remote attackers to execute arbitrary commands via "special characters," a different vulnerability than CVE-2016-7109. | 2016-09-07 | 2026-05-06 | CWE-94 | huawei/uma:* | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-uma-en|http://www.securityfocus.com/bid/92617|http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-uma-en|http://www.securityfocus.com/bid/92617 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Code Injection | Execution | 98.5 | CRITICAL | huawei/uma | False | Unknown | nan |
CVE-2016-4375 | Multiple unspecified vulnerabilities in HPE Integrated Lights-Out 3 (aka iLO 3) firmware before 1.88, Integrated Lights-Out 4 (aka iLO 4) firmware before 2.44, and Integrated Lights-Out 4 (aka iLO 4) mRCA firmware before 2.32 allow remote attackers to obtain sensitive information, modify data, or cause a denial of serv... | 2016-09-08 | 2026-05-06 | UNKNOWN | hp/integrated_lights-out_3_firmware:1.87|hp/integrated_lights-out_4_firmware:2.43|hp/integrated_lights-out_4_mrca_firmware:2.31 | http://www.securityfocus.com/bid/92484|http://www.securitytracker.com/id/1036629|https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05236950|http://www.securityfocus.com/bid/92484|http://www.securitytracker.com/id/1036629 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | hp/integrated_lights-out_3_firmware | False | Unknown | nan |
CVE-2016-1279 | J-Web in Juniper Junos OS before 12.1X46-D45, 12.1X46-D50, 12.1X47 before 12.1X47-D35, 12.3 before 12.3R12, 12.3X48 before 12.3X48-D25, 13.3 before 13.3R10, 13.3R9 before 13.3R9-S1, 14.1 before 14.1R7, 14.1X53 before 14.1X53-D35, 14.2 before 14.2R6, 15.1 before 15.1A2 or 15.1F4, 15.1X49 before 15.1X49-D30, and 15.1R be... | 2016-09-09 | 2026-05-06 | CWE-200|CWE-287 | juniper/junos:*|juniper/junos:12.1x46|juniper/junos:12.1x47|juniper/junos:12.1x47|juniper/junos:12.1x47|juniper/junos:12.1x47|juniper/junos:12.1x47|juniper/junos:12.1x47|juniper/junos:12.3|juniper/junos:12.3 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10754|http://www.securityfocus.com/bid/91759|http://www.securitytracker.com/id/1036302|http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10754|http://www.securityfocus.com/bid/91759 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Information Disclosure | Collection | 83.5 | HIGH | juniper/junos | False | Unknown | nan |
CVE-2016-4573 | Fortinet FortiSwitch FSW-108D-POE, FSW-124D, FSW-124D-POE, FSW-224D-POE, FSW-224D-FPOE, FSW-248D-POE, FSW-248D-FPOE, FSW-424D, FSW-424D-POE, FSW-424D-FPOE, FSW-448D, FSW-448D-POE, FSW-448D-FPOE, FSW-524D, FSW-524D-FPOE, FSW-548D, FSW-548D-FPOE, FSW-1024D, FSW-1048D, FSW-3032D, and FSW-R-112D-POE models, when in FortiLi... | 2016-09-09 | 2026-05-06 | CWE-264 | fortinet/fortiswitch:3.4.1 | http://fortiguard.com/advisory/fortiswitch-rest-admin-account-exposed-under-specific-conditions|http://www.securityfocus.com/bid/92450|https://www.themissinglink.com.au/security/advisories/cve-2016-4573|http://fortiguard.com/advisory/fortiswitch-rest-admin-account-exposed-under-specific-conditions|http://www.securityfo... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | fortinet/fortiswitch | False | Unknown | nan |
CVE-2016-3877 | Unspecified vulnerability in Android before 2016-09-01 has unknown impact and attack vectors. | 2016-09-11 | 2026-05-06 | UNKNOWN | google/android:* | http://source.android.com/security/bulletin/2016-09-01.html|http://www.securitytracker.com/id/1036763|http://source.android.com/security/bulletin/2016-09-01.html|http://www.securitytracker.com/id/1036763 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-7124 | ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call. | 2016-09-12 | 2026-05-06 | CWE-502 | php/php:7.0.0|php/php:7.0.1|php/php:7.0.2|php/php:7.0.3|php/php:7.0.4|php/php:7.0.5|php/php:7.0.6|php/php:7.0.7|php/php:7.0.8|php/php:7.0.9 | http://openwall.com/lists/oss-security/2016/09/02/9|http://rhn.redhat.com/errata/RHSA-2016-2750.html|http://www.php.net/ChangeLog-5.php|http://www.php.net/ChangeLog-7.php|http://www.securityfocus.com/bid/92756 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Deserialization Vulnerability | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-7126 | The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value ... | 2016-09-12 | 2026-05-06 | CWE-787 | php/php:7.0.0|php/php:7.0.1|php/php:7.0.2|php/php:7.0.3|php/php:7.0.4|php/php:7.0.5|php/php:7.0.6|php/php:7.0.7|php/php:7.0.8|php/php:7.0.9 | http://openwall.com/lists/oss-security/2016/09/02/9|http://rhn.redhat.com/errata/RHSA-2016-2750.html|http://www.php.net/ChangeLog-5.php|http://www.php.net/ChangeLog-7.php|http://www.securityfocus.com/bid/92755 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Out-of-Bounds Write | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-7127 | The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments. | 2016-09-12 | 2026-05-06 | CWE-787 | php/php:*|php/php:7.0.0|php/php:7.0.1|php/php:7.0.2|php/php:7.0.3|php/php:7.0.4|php/php:7.0.5|php/php:7.0.6|php/php:7.0.7|php/php:7.0.8 | http://openwall.com/lists/oss-security/2016/09/02/9|http://rhn.redhat.com/errata/RHSA-2016-2750.html|http://www.php.net/ChangeLog-5.php|http://www.php.net/ChangeLog-7.php|http://www.securityfocus.com/bid/92757 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Out-of-Bounds Write | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.