cve_id stringlengths 13 16 ⌀ | description stringlengths 34 2.67k ⌀ | published_date stringdate 1999-03-01 00:00:00 2018-08-06 00:00:00 ⌀ | last_modified stringdate 2024-11-21 00:00:00 2026-05-06 00:00:00 ⌀ | cwe_ids stringclasses 347
values | affected_products stringlengths 7 639 ⌀ | reference_urls stringlengths 49 643 ⌀ | exploit_available stringclasses 2
values | cvss_score stringclasses 35
values | cvss_severity stringclasses 4
values | attack_vector stringclasses 3
values | attack_complexity stringclasses 2
values | privileges_required stringclasses 3
values | user_interaction stringclasses 2
values | scope stringclasses 2
values | confidentiality_impact stringclasses 3
values | integrity_impact stringclasses 3
values | availability_impact stringclasses 3
values | exploitability_score stringclasses 12
values | impact_score stringclasses 15
values | attack_type stringclasses 33
values | likely_mitre_tactic stringclasses 7
values | risk_score stringclasses 58
values | risk_level stringclasses 4
values | primary_vendor_product stringlengths 5 107 ⌀ | in_cisa_kev stringclasses 2
values | ransomware_use stringclasses 2
values | kev_required_action stringclasses 7
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2016-7129 | The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime e... | 2016-09-12 | 2026-05-06 | CWE-20 | php/php:7.0.0|php/php:7.0.1|php/php:7.0.2|php/php:7.0.3|php/php:7.0.4|php/php:7.0.5|php/php:7.0.6|php/php:7.0.7|php/php:7.0.8|php/php:7.0.9 | http://openwall.com/lists/oss-security/2016/09/02/9|http://rhn.redhat.com/errata/RHSA-2016-2750.html|http://www.php.net/ChangeLog-5.php|http://www.php.net/ChangeLog-7.php|http://www.securityfocus.com/bid/92758 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-7134 | ext/curl/interface.c in PHP 7.x before 7.0.10 does not work around a libcurl integer overflow, which allows remote attackers to cause a denial of service (allocation error and heap-based buffer overflow) or possibly have unspecified other impact via a long string that is mishandled in a curl_escape call. | 2016-09-12 | 2026-05-06 | CWE-119 | php/php:7.0.0|php/php:7.0.1|php/php:7.0.2|php/php:7.0.3|php/php:7.0.4|php/php:7.0.5|php/php:7.0.6|php/php:7.0.7|php/php:7.0.8|php/php:7.0.9 | http://openwall.com/lists/oss-security/2016/09/02/9|http://www.php.net/ChangeLog-7.php|http://www.securityfocus.com/bid/92766|http://www.securitytracker.com/id/1036680|https://bugs.php.net/bug.php?id=72674 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | php/php | False | Unknown | nan |
CVE-2016-6394 | Session fixation vulnerability in Cisco Firepower Management Center and Cisco FireSIGHT System Software through 6.1.0 allows remote attackers to hijack web sessions via a session identifier, aka Bug ID CSCuz80503. | 2016-09-12 | 2026-05-06 | CWE-264 | cisco/firesight_system_software:5.2.0|cisco/firesight_system_software:5.2.0.1|cisco/firesight_system_software:5.2.0.2|cisco/firesight_system_software:5.2.0.3|cisco/firesight_system_software:5.2.0.4|cisco/firesight_system_software:5.2.0.5|cisco/firesight_system_software:5.2.0.6|cisco/firesight_system_software:5.2.0.8|ci... | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsmc|http://www.securityfocus.com/bid/92825|http://www.securitytracker.com/id/1036757|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsmc|http://www.securityfocus.com/bid/92825 | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Other | Unknown | 80.0 | HIGH | cisco/firesight_system_software | False | Unknown | nan |
CVE-2016-2182 | The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors. | 2016-09-16 | 2026-05-06 | CWE-787 | hp/icewall_federation_agent:3.0|hp/icewall_mcrp:3.0|hp/icewall_sso:10.0|hp/icewall_sso:10.0|hp/icewall_sso_agent_option:10.0|openssl/openssl:1.0.1|openssl/openssl:1.0.1a|openssl/openssl:1.0.1b|openssl/openssl:1.0.1c|openssl/openssl:1.0.1d | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759|http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html|http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html|http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html|http://lists.opensuse.org/opens... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Out-of-Bounds Write | Execution | 98.5 | CRITICAL | hp/icewall_federation_agent | False | Unknown | nan |
CVE-2016-4256 | Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4257, CVE-2016-4258, CVE-2016-4259, CVE-2016-4260, CVE-2016-4261, and CVE-2016-4262. | 2016-09-16 | 2026-05-06 | CWE-119 | adobe/digital_editions:* | http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793|https://helpx.adobe.com/security/products/Digital-Editions/apsb16-28.html|http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/digital_editions | False | Unknown | nan |
CVE-2016-4257 | Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4258, CVE-2016-4259, CVE-2016-4260, CVE-2016-4261, and CVE-2016-4262. | 2016-09-16 | 2026-05-06 | CWE-119 | adobe/digital_editions:* | http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793|https://helpx.adobe.com/security/products/Digital-Editions/apsb16-28.html|http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/digital_editions | False | Unknown | nan |
CVE-2016-4258 | Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4259, CVE-2016-4260, CVE-2016-4261, and CVE-2016-4262. | 2016-09-16 | 2026-05-06 | CWE-119 | adobe/digital_editions:* | http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793|https://helpx.adobe.com/security/products/Digital-Editions/apsb16-28.html|http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/digital_editions | False | Unknown | nan |
CVE-2016-4259 | Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4258, CVE-2016-4260, CVE-2016-4261, and CVE-2016-4262. | 2016-09-16 | 2026-05-06 | CWE-119 | adobe/digital_editions:* | http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793|https://helpx.adobe.com/security/products/Digital-Editions/apsb16-28.html|http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/digital_editions | False | Unknown | nan |
CVE-2016-4260 | Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4258, CVE-2016-4259, CVE-2016-4261, and CVE-2016-4262. | 2016-09-16 | 2026-05-06 | CWE-119 | adobe/digital_editions:* | http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793|https://helpx.adobe.com/security/products/Digital-Editions/apsb16-28.html|http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/digital_editions | False | Unknown | nan |
CVE-2016-4261 | Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4258, CVE-2016-4259, CVE-2016-4260, and CVE-2016-4262. | 2016-09-16 | 2026-05-06 | CWE-119 | adobe/digital_editions:* | http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793|https://helpx.adobe.com/security/products/Digital-Editions/apsb16-28.html|http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/digital_editions | False | Unknown | nan |
CVE-2016-4262 | Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4258, CVE-2016-4259, CVE-2016-4260, and CVE-2016-4261. | 2016-09-16 | 2026-05-06 | CWE-119 | adobe/digital_editions:* | http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793|https://helpx.adobe.com/security/products/Digital-Editions/apsb16-28.html|http://www.securityfocus.com/bid/92928|http://www.securitytracker.com/id/1036793 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | adobe/digital_editions | False | Unknown | nan |
CVE-2016-4263 | Use-after-free vulnerability in Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code via unspecified vectors. | 2016-09-16 | 2026-05-06 | CWE-416 | adobe/digital_editions:* | http://www.securityfocus.com/bid/92925|http://www.securitytracker.com/id/1036793|https://helpx.adobe.com/security/products/Digital-Editions/apsb16-28.html|http://www.securityfocus.com/bid/92925|http://www.securitytracker.com/id/1036793 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 83.5 | HIGH | adobe/digital_editions | False | Unknown | nan |
CVE-2016-6303 | Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors. | 2016-09-16 | 2026-05-06 | CWE-787 | nodejs/node.js:*|nodejs/node.js:*|nodejs/node.js:*|openssl/openssl:1.0.1|openssl/openssl:1.0.1a|openssl/openssl:1.0.1b|openssl/openssl:1.0.1c|openssl/openssl:1.0.1d|openssl/openssl:1.0.1e|openssl/openssl:1.0.1f | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759|http://www-01.ibm.com/support/docview.wss?uid=swg21995039|http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html|http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html|http://www.oracle.com/technetwork/security-adv... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Out-of-Bounds Write | Execution | 98.5 | CRITICAL | nodejs/node.js | False | Unknown | nan |
CVE-2016-5843 | Multiple SQL injection vulnerabilities in the FAQ package 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5 in Open Ticket Request System (OTRS) allow remote attackers to execute arbitrary SQL commands via crafted search parameters. | 2016-09-17 | 2026-05-06 | CWE-89 | otrs/faq:2.0.1|otrs/faq:2.0.2|otrs/faq:2.0.3|otrs/faq:2.0.4|otrs/faq:2.0.5|otrs/faq:2.0.6|otrs/faq:2.0.7|otrs/faq:2.0.8|otrs/faq:2.1.0|otrs/faq:2.1.1 | http://www.securityfocus.com/bid/93019|https://github.com/OTRS/FAQ/commit/3700f75c67f6ed1d39bc213445c6d12a458e1af9|https://github.com/OTRS/FAQ/commit/8c9d63bd0297adda760330805c31afc130861557|https://github.com/OTRS/FAQ/commit/b805703e7b7725d1f3040bb626a4c4dd845ee9e3|https://www.otrs.com/security-advisory-2016-01-securi... | False | 9.4 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | LOW | 3.9 | 5.5 | SQL Injection | Initial Access | 81.5 | HIGH | otrs/faq | False | Unknown | nan |
CVE-2016-6937 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnera... | 2016-09-17 | 2026-05-06 | CWE-119 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/93014|http://www.securitytracker.com/id/1036986|http://www.securitytracker.com/id/1037574|http://www.zerodayinitiative.com/advisories/ZDI-16-574|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-6938 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-... | 2016-09-17 | 2026-05-06 | CWE-416 | adobe/acrobat:*|adobe/acrobat_dc:*|adobe/acrobat_dc:*|adobe/acrobat_reader_dc:*|adobe/acrobat_reader_dc:*|adobe/reader:* | http://www.securityfocus.com/bid/93016|http://www.zerodayinitiative.com/advisories/ZDI-16-591|https://helpx.adobe.com/security/products/acrobat/apsb16-26.html|http://www.securityfocus.com/bid/93016|http://www.zerodayinitiative.com/advisories/ZDI-16-591 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | adobe/acrobat | False | Unknown | nan |
CVE-2016-7411 | ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object. | 2016-09-17 | 2026-05-06 | CWE-119 | php/php:* | http://www.openwall.com/lists/oss-security/2016/09/15/10|http://www.php.net/ChangeLog-5.php|http://www.securityfocus.com/bid/93009|http://www.securitytracker.com/id/1036836|https://bugs.php.net/bug.php?id=73052 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-7413 | Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to misha... | 2016-09-17 | 2026-05-06 | CWE-416 | php/php:*|php/php:7.0.0|php/php:7.0.1|php/php:7.0.2|php/php:7.0.3|php/php:7.0.4|php/php:7.0.5|php/php:7.0.6|php/php:7.0.7|php/php:7.0.8 | http://www.openwall.com/lists/oss-security/2016/09/15/10|http://www.php.net/ChangeLog-5.php|http://www.php.net/ChangeLog-7.php|http://www.securityfocus.com/bid/93006|http://www.securitytracker.com/id/1036836 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-7414 | The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related t... | 2016-09-17 | 2026-05-06 | CWE-119 | php/php:*|php/php:7.0.0|php/php:7.0.1|php/php:7.0.2|php/php:7.0.3|php/php:7.0.4|php/php:7.0.5|php/php:7.0.6|php/php:7.0.7|php/php:7.0.8 | http://www.openwall.com/lists/oss-security/2016/09/15/10|http://www.php.net/ChangeLog-5.php|http://www.php.net/ChangeLog-7.php|http://www.securityfocus.com/bid/93004|http://www.securitytracker.com/id/1036836 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-7415 | Stack-based buffer overflow in the Locale class in common/locid.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long locale string. | 2016-09-17 | 2026-05-06 | CWE-119 | icu-project/international_components_for_unicode:* | http://www.openwall.com/lists/oss-security/2016/09/15/10|http://www.securityfocus.com/bid/93022|https://bugs.php.net/bug.php?id=73007|https://security.gentoo.org/glsa/201701-58|https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | icu-project/international_components_for_unicode | False | Unknown | nan |
CVE-2016-7417 | ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data. | 2016-09-17 | 2026-05-06 | CWE-20 | php/php:*|php/php:7.0.0|php/php:7.0.1|php/php:7.0.2|php/php:7.0.3|php/php:7.0.4|php/php:7.0.5|php/php:7.0.6|php/php:7.0.7|php/php:7.0.8 | http://www.openwall.com/lists/oss-security/2016/09/15/10|http://www.php.net/ChangeLog-5.php|http://www.php.net/ChangeLog-7.php|http://www.securityfocus.com/bid/93007|http://www.securitytracker.com/id/1036836 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2016-0883 | Pivotal Cloud Foundry (PCF) Ops Manager before 1.5.14 and 1.6.x before 1.6.9 uses the same cookie-encryption key across different customers' installations, which allows remote attackers to bypass session authentication by leveraging knowledge of this key from another installation. | 2016-09-18 | 2026-05-06 | CWE-287 | pivotal_software/operations_manager:*|pivotal_software/operations_manager:1.6.0|pivotal_software/operations_manager:1.6.1|pivotal_software/operations_manager:1.6.2|pivotal_software/operations_manager:1.6.3|pivotal_software/operations_manager:1.6.4|pivotal_software/operations_manager:1.6.5|pivotal_software/operations_ma... | https://pivotal.io/security/pcf-ops-manager-weak-authentication-scheme|https://pivotal.io/security/pcf-ops-manager-weak-authentication-scheme | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 83.5 | HIGH | pivotal_software/operations_manager | False | Unknown | nan |
CVE-2016-0897 | Pivotal Cloud Foundry (PCF) Ops Manager before 1.6.17 and 1.7.x before 1.7.8, when vCloud or vSphere is used, does not properly enable SSH access for operators, which has unspecified impact and remote attack vectors. | 2016-09-18 | 2026-05-06 | CWE-310 | pivotal_software/operations_manager:*|pivotal_software/operations_manager:1.7.0|pivotal_software/operations_manager:1.7.1|pivotal_software/operations_manager:1.7.2|pivotal_software/operations_manager:1.7.3|pivotal_software/operations_manager:1.7.4|pivotal_software/operations_manager:1.7.5|pivotal_software/operations_ma... | https://pivotal.io/security/cve-2016-0897|https://pivotal.io/security/cve-2016-0897 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 83.5 | HIGH | pivotal_software/operations_manager | False | Unknown | nan |
CVE-2016-0922 | EMC ViPR SRM before 3.7.2 does not restrict the number of password-authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force guessing attack. | 2016-09-18 | 2026-05-06 | CWE-285 | emc/vipr_srm:* | http://seclists.org/bugtraq/2016/Sep/17|http://www.securityfocus.com/bid/92945|http://seclists.org/bugtraq/2016/Sep/17|http://www.securityfocus.com/bid/92945 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | emc/vipr_srm | False | Unknown | nan |
CVE-2016-0930 | Pivotal Cloud Foundry (PCF) Ops Manager before 1.6.19 and 1.7.x before 1.7.10, when vCloud or vSphere is used, has a default password for compilation VMs, which allows remote attackers to obtain SSH access by connecting within an installation-time period during which these VMs exist. | 2016-09-18 | 2026-05-06 | CWE-362 | pivotal/operations_manager:*|pivotal/operations_manager:1.7.0|pivotal/operations_manager:1.7.1|pivotal/operations_manager:1.7.2|pivotal/operations_manager:1.7.3|pivotal/operations_manager:1.7.4|pivotal/operations_manager:1.7.5|pivotal/operations_manager:1.7.6|pivotal/operations_manager:1.7.7|pivotal/operations_manager:... | http://www.securityfocus.com/bid/93027|https://pivotal.io/security/cve-2016-0930|http://www.securityfocus.com/bid/93027|https://pivotal.io/security/cve-2016-0930 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Race Condition | Unknown | 83.5 | HIGH | pivotal/operations_manager | False | Unknown | nan |
CVE-2016-6535 | AVer Information EH6108H+ devices with firmware X9.03.24.00.07l have hardcoded accounts, which allows remote attackers to obtain root access by leveraging knowledge of the credentials and establishing a TELNET session. | 2016-09-19 | 2026-05-06 | CWE-798 | aver/eh6108h\+_firmware:x9.03.24.00.07l | http://www.kb.cert.org/vuls/id/667480|http://www.securityfocus.com/bid/92936|http://www.kb.cert.org/vuls/id/667480|http://www.securityfocus.com/bid/92936 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | aver/eh6108h\+_firmware | False | Unknown | nan |
CVE-2016-6536 | The /setup URI on AVer Information EH6108H+ devices with firmware X9.03.24.00.07l allows remote attackers to bypass intended page-access restrictions or modify passwords by leveraging knowledge of a handle parameter value. | 2016-09-19 | 2026-05-06 | CWE-264 | aver/eh6108h\+_firmware:* | http://www.kb.cert.org/vuls/id/667480|http://www.securityfocus.com/bid/92936|http://www.kb.cert.org/vuls/id/667480|http://www.securityfocus.com/bid/92936 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | aver/eh6108h\+_firmware | False | Unknown | nan |
CVE-2016-6662 | Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protect... | 2016-09-20 | 2026-05-06 | CWE-264 | oracle/mysql:*|oracle/mysql:*|oracle/mysql:*|percona/percona_server:*|percona/percona_server:*|percona/percona_server:*|mariadb/mariadb:*|mariadb/mariadb:*|mariadb/mariadb:*|debian/debian_linux:8.0 | http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html|http://rhn.redhat.com/errata/RHSA-2016-2058.html|http://rhn.redhat.com/errata/RHSA-2016-2059.html|http://rhn.redhat.com/errata/RHSA-2016-2060.html|http://rhn.redhat.com/errata/RHSA-2016-2061.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | oracle/mysql | False | Unknown | nan |
CVE-2016-0903 | Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar Server before 7.3.0-233 rely on client-side authentication, which allows remote attackers to spoof clients and read backup data via a modified client agent. | 2016-09-21 | 2026-05-06 | CWE-200 | emc/avamar_server:* | http://seclists.org/bugtraq/2016/Sep/31|http://www.securityfocus.com/bid/93026|http://www.securitytracker.com/id/1036844|http://seclists.org/bugtraq/2016/Sep/31|http://www.securityfocus.com/bid/93026 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Information Disclosure | Collection | 95.0 | CRITICAL | emc/avamar_server | False | Unknown | nan |
CVE-2016-0917 | The SMB service in EMC VNXe (VNXe3200 Operating Environment prior to 3.1.5.8711957 and VNXe3100/3150/3300 Operating Environment prior to 2.4.4.22638), VNX1 File OE before 7.1.80.3, VNX2 File OE before 8.1.9.155, and Celerra (all supported versions) does not prevent duplicate NTLM challenge-response nonces, which makes ... | 2016-09-21 | 2026-05-06 | CWE-264 | emc/vnx1_oe_firmware:-|emc/vnx2_oe_firmware:-|emc/vnxe_oe_firmware:- | http://seclists.org/bugtraq/2016/Sep/32|http://www.securityfocus.com/archive/1/539993/30/0/threaded|http://www.securityfocus.com/bid/93023|http://www.securitytracker.com/id/1036843|http://seclists.org/bugtraq/2016/Sep/32 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | emc/vnx1_oe_firmware | False | Unknown | nan |
CVE-2016-6530 | Dentsply Sirona (formerly Schick) CDR Dicom 5 and earlier has default passwords for the sa and cdr accounts, which allows remote attackers to obtain administrative access by leveraging knowledge of these passwords. | 2016-09-21 | 2026-05-06 | CWE-798 | dentsply_sirona/cdr_dicom:* | http://www.kb.cert.org/vuls/id/548399|http://www.securityfocus.com/bid/92777|https://www.schickbysirona.com/items.php?itemid=19189|http://www.kb.cert.org/vuls/id/548399|http://www.securityfocus.com/bid/92777 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | dentsply_sirona/cdr_dicom | False | Unknown | nan |
CVE-2015-8871 | Use-after-free vulnerability in the opj_j2k_write_mco function in j2k.c in OpenJPEG before 2.1.1 allows remote attackers to have unspecified impact via unknown vectors. | 2016-09-21 | 2026-05-06 | CWE-416 | debian/debian_linux:8.0|uclouvain/openjpeg:* | http://www.debian.org/security/2016/dsa-3665|http://www.openwall.com/lists/oss-security/2015/09/15/4|http://www.openwall.com/lists/oss-security/2016/05/13/1|http://www.securitytracker.com/id/1038623|https://bugzilla.redhat.com/show_bug.cgi?id=1263359 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | debian/debian_linux | False | Unknown | nan |
CVE-2016-6354 | Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read. | 2016-09-21 | 2026-05-06 | CWE-119 | debian/debian_linux:8.0|westes/flex:* | http://www.debian.org/security/2016/dsa-3653|http://www.openwall.com/lists/oss-security/2016/07/18/8|http://www.openwall.com/lists/oss-security/2016/07/26/12|https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466|https://security.gentoo.org/glsa/201701-31 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | debian/debian_linux | False | Unknown | nan |
CVE-2016-4464 | The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature... | 2016-09-21 | 2026-05-06 | CWE-284 | apache/cxf_fediz:1.2.0|apache/cxf_fediz:1.2.1|apache/cxf_fediz:1.2.2|apache/cxf_fediz:1.3.0 | http://cxf.apache.org/security-advisories.data/CVE-2016-4464.txt.asc|http://www.openwall.com/lists/oss-security/2016/09/08/20|http://www.securityfocus.com/bid/92905|http://www.securitytracker.com/id/1036869|https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git%3Ba=commit%3Bh=0006581e9cacbeef46381a223e5671e524d416b6 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | apache/cxf_fediz | False | Unknown | nan |
CVE-2016-6525 | Heap-based buffer overflow in the pdf_load_mesh_params function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a large decode array. | 2016-09-22 | 2026-05-06 | CWE-119 | debian/debian_linux:8.0|artifex/mupdf:* | http://bugs.ghostscript.com/show_bug.cgi?id=696954|http://git.ghostscript.com/?p=mupdf.git%3Bh=39b0f07dd960f34e7e6bf230ffc3d87c41ef0f2e|http://www.debian.org/security/2016/dsa-3655|http://www.openwall.com/lists/oss-security/2016/08/03/8|http://www.securityfocus.com/bid/92266 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | debian/debian_linux | False | Unknown | nan |
CVE-2016-5256 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | 2016-09-22 | 2026-05-06 | CWE-119 | mozilla/firefox:* | http://www.mozilla.org/security/announce/2016/mfsa2016-85.html|http://www.securityfocus.com/bid/93052|http://www.securitytracker.com/id/1036852|https://bugzilla.mozilla.org/show_bug.cgi?id=1268034|https://bugzilla.mozilla.org/show_bug.cgi?id=1276413 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | mozilla/firefox | False | Unknown | nan |
CVE-2016-5257 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4 and Thunderbird < 45.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | 2016-09-22 | 2026-05-06 | CWE-119 | mozilla/firefox:*|mozilla/firefox:45.1.0|mozilla/firefox:45.1.1|mozilla/firefox:45.2.0|mozilla/firefox:45.3.0 | http://rhn.redhat.com/errata/RHSA-2016-1912.html|http://rhn.redhat.com/errata/RHSA-2016-1985.html|http://www.debian.org/security/2016/dsa-3674|http://www.debian.org/security/2016/dsa-3690|http://www.mozilla.org/security/announce/2016/mfsa2016-85.html | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | mozilla/firefox | False | Unknown | nan |
CVE-2016-5270 | Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characte... | 2016-09-22 | 2026-05-06 | CWE-119|CWE-787 | mozilla/firefox:*|mozilla/firefox:45.1.0|mozilla/firefox:45.1.1|mozilla/firefox:45.2.0|mozilla/firefox:45.3.0 | http://rhn.redhat.com/errata/RHSA-2016-1912.html|http://www.debian.org/security/2016/dsa-3674|http://www.mozilla.org/security/announce/2016/mfsa2016-85.html|http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html|http://www.securityfocus.com/bid/93049 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 83.5 | HIGH | mozilla/firefox | False | Unknown | nan |
CVE-2016-5274 | Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation. | 2016-09-22 | 2026-05-06 | CWE-416 | mozilla/firefox:*|mozilla/firefox:45.1.0|mozilla/firefox:45.1.1|mozilla/firefox:45.2.0|mozilla/firefox:45.3.0 | http://rhn.redhat.com/errata/RHSA-2016-1912.html|http://www.debian.org/security/2016/dsa-3674|http://www.mozilla.org/security/announce/2016/mfsa2016-85.html|http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html|http://www.securityfocus.com/bid/93049 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 83.5 | HIGH | mozilla/firefox | False | Unknown | nan |
CVE-2016-5276 | Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute. | 2016-09-22 | 2026-05-06 | CWE-416 | mozilla/firefox:*|mozilla/firefox:45.1.0|mozilla/firefox:45.1.1|mozilla/firefox:45.2.0|mozilla/firefox:45.3.0 | http://rhn.redhat.com/errata/RHSA-2016-1912.html|http://www.debian.org/security/2016/dsa-3674|http://www.mozilla.org/security/announce/2016/mfsa2016-85.html|http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html|http://www.securityfocus.com/bid/93049 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 83.5 | HIGH | mozilla/firefox | False | Unknown | nan |
CVE-2016-5277 | Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction ... | 2016-09-22 | 2026-05-06 | CWE-416 | mozilla/firefox:*|mozilla/firefox:45.1.0|mozilla/firefox:45.1.1|mozilla/firefox:45.2.0|mozilla/firefox:45.3.0 | http://rhn.redhat.com/errata/RHSA-2016-1912.html|http://www.debian.org/security/2016/dsa-3674|http://www.mozilla.org/security/announce/2016/mfsa2016-85.html|http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html|http://www.securityfocus.com/bid/93049 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 83.5 | HIGH | mozilla/firefox | False | Unknown | nan |
CVE-2016-5280 | Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code via bidirectional text. | 2016-09-22 | 2026-05-06 | CWE-416 | mozilla/firefox:*|mozilla/firefox:45.0|mozilla/firefox:45.0.1|mozilla/firefox:45.0.2|mozilla/firefox:45.1.1|mozilla/firefox:45.2.0|mozilla/firefox:45.3.0 | http://rhn.redhat.com/errata/RHSA-2016-1912.html|http://www.debian.org/security/2016/dsa-3674|http://www.mozilla.org/security/announce/2016/mfsa2016-85.html|http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html|http://www.securityfocus.com/bid/93049 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | mozilla/firefox | False | Unknown | nan |
CVE-2016-5281 | Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document. | 2016-09-22 | 2026-05-06 | CWE-416 | mozilla/firefox:*|mozilla/firefox:45.0|mozilla/firefox:45.0.1|mozilla/firefox:45.0.2|mozilla/firefox:45.1.1|mozilla/firefox:45.2.0|mozilla/firefox:45.3.0 | http://rhn.redhat.com/errata/RHSA-2016-1912.html|http://www.debian.org/security/2016/dsa-3674|http://www.geeknik.net/7gr1u98b9|http://www.mozilla.org/security/announce/2016/mfsa2016-85.html|http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | mozilla/firefox | False | Unknown | nan |
CVE-2016-6374 | Cisco Cloud Services Platform (CSP) 2100 2.0 allows remote attackers to execute arbitrary code via a crafted dnslookup command in an HTTP request, aka Bug ID CSCuz89093. | 2016-09-22 | 2026-05-06 | CWE-20 | cisco/cloud_services_platform_2100:2.0.0 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-csp2100-2|http://www.securityfocus.com/bid/93095|http://www.securitytracker.com/id/1036864|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-csp2100-2|http://www.securityfocus.com/bid/93095 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | cisco/cloud_services_platform_2100 | False | Unknown | nan |
CVE-2016-6406 | Cisco IronPort AsyncOS 9.1.2-023, 9.1.2-028, 9.1.2-036, 9.7.2-046, 9.7.2-047, 9.7.2-054, 10.0.0-124, and 10.0.0-125 on Email Security Appliance (ESA) devices, when Enrollment Client before 1.0.2-065 is installed, allows remote attackers to obtain root access via a connection to the testing/debugging interface, aka Bug ... | 2016-09-22 | 2026-05-06 | CWE-264 | cisco/email_security_appliance_firmware:9.1.2-023|cisco/email_security_appliance_firmware:9.1.2-028|cisco/email_security_appliance_firmware:9.1.2-036|cisco/email_security_appliance_firmware:9.7.2-046|cisco/email_security_appliance_firmware:9.7.2-047|cisco/email_security_appliance_firmware:9.7.2-054|cisco/email_security... | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160922-esa|http://www.securityfocus.com/bid/93116|http://www.securitytracker.com/id/1036881|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160922-esa|http://www.securityfocus.com/bid/93116 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | cisco/email_security_appliance_firmware | False | Unknown | nan |
CVE-2016-6531 | Open Dental 16.1 and earlier has a hardcoded MySQL root password, which allows remote attackers to obtain administrative access by leveraging access to intranet TCP port 3306. NOTE: the vendor disputes this issue, stating that the "vulnerability note ... is factually false ... there is indeed a default blank password, ... | 2016-09-24 | 2026-05-06 | CWE-255 | opendental/opendental:* | http://www.kb.cert.org/vuls/id/619767|http://www.kb.cert.org/vuls/id/GWAN-ACVSBM|http://www.securityfocus.com/bid/92780|http://www.kb.cert.org/vuls/id/619767|http://www.kb.cert.org/vuls/id/GWAN-ACVSBM | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | opendental/opendental | False | Unknown | nan |
CVE-2016-6532 | DEXIS Imaging Suite 10 has a hardcoded password for the sa account, which allows remote attackers to obtain administrative access by entering this password in a DEXIS_DATA SQL Server session. | 2016-09-24 | 2026-05-06 | CWE-798 | dexis/imaging_suite:* | http://www.kb.cert.org/vuls/id/282991|http://www.securityfocus.com/bid/92823|http://www.kb.cert.org/vuls/id/282991|http://www.securityfocus.com/bid/92823 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | dexis/imaging_suite | False | Unknown | nan |
CVE-2016-4658 | xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption)... | 2016-09-25 | 2026-05-06 | CWE-119 | apple/iphone_os:*|apple/mac_os_x:*|apple/tvos:*|apple/watchos:*|xmlsoft/libxml2:* | http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html|http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html|http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html|http://www.securityfocus.com... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | apple/iphone_os | False | Unknown | nan |
CVE-2016-4694 | The Apache HTTP Server in Apple OS X before 10.12 and OS X Server before 5.2 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted CGI client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP tr... | 2016-09-25 | 2026-05-06 | CWE-284 | apple/mac_os_x:*|apple/os_x_server:* | http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://lists.apple.com/archives/security-announce/2016/Sep/msg00009.html|http://www.securityfocus.com/bid/93060|http://www.securitytracker.com/id/1036853|https://support.apple.com/HT207170 | False | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Other | Unknown | 80.0 | HIGH | apple/mac_os_x | False | Unknown | nan |
CVE-2016-4702 | Audio in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | 2016-09-25 | 2026-05-06 | CWE-119 | apple/iphone_os:*|apple/mac_os_x:*|apple/tvos:*|apple/watchos:* | http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html|http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html|http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html|http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html|http://www.securityfocus.com... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | apple/iphone_os | False | Unknown | nan |
CVE-2016-4734 | WebKit in Apple iOS before 10, Safari before 10, and tvOS before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4611, CVE-2016-4730, CVE-2016-4733, and CVE-2016-4735. | 2016-09-25 | 2026-05-06 | CWE-119 | apple/safari:*|apple/iphone_os:*|apple/tvos:* | http://lists.apple.com/archives/security-announce/2016/Sep/msg00007.html|http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html|http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html|http://www.securityfocus.com/bid/93057|http://www.securitytracker.com/id/1036854 | True | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Buffer Overflow | Execution | 92.0 | CRITICAL | apple/safari | False | Unknown | nan |
CVE-2016-4303 | The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow. | 2016-09-26 | 2026-05-06 | CWE-120 | es/iperf3:*|es/iperf3:*|novell/suse_package_hub_for_suse_linux_enterprise:12|opensuse/leap:42.1|opensuse/opensuse:13.2|debian/debian_linux:8.0 | http://blog.talosintel.com/2016/06/esnet-vulnerability.html|http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.html|http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.html|http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-released|http://www.talosintelligence.com/reports/T... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Unknown | 98.5 | CRITICAL | es/iperf3 | False | Unknown | nan |
CVE-2016-4972 | OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows ... | 2016-09-26 | 2026-05-06 | CWE-20 | openstack/mitaka-murano:*|openstack/murano:*|openstack/murano-dashboard:*|openstack/python-muranoclient:* | http://www.openwall.com/lists/oss-security/2016/06/23/8|https://bugs.launchpad.net/murano/+bug/1586079|https://bugs.launchpad.net/python-muranoclient/+bug/1586078|http://www.openwall.com/lists/oss-security/2016/06/23/8|https://bugs.launchpad.net/murano/+bug/1586079 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | openstack/mitaka-murano | False | Unknown | nan |
CVE-2016-6980 | Use-after-free vulnerability in Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4263. | 2016-09-26 | 2026-05-06 | CWE-416 | adobe/digital_editions:* | http://www.securityfocus.com/bid/93179|http://www.securitytracker.com/id/1036793|https://helpx.adobe.com/security/products/Digital-Editions/apsb16-28.html|http://www.securityfocus.com/bid/93179|http://www.securitytracker.com/id/1036793 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | adobe/digital_editions | False | Unknown | nan |
CVE-2016-6309 | statem/statem.c in OpenSSL 1.1.0a does not consider memory-block movement after a realloc call, which allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code via a crafted TLS session. | 2016-09-26 | 2026-05-06 | CWE-416 | openssl/openssl:1.1.0a | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759|http://www-01.ibm.com/support/docview.wss?uid=swg21995039|http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html|http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html|http://www.oracle.com/technetwork/security-adv... | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 83.5 | HIGH | openssl/openssl | False | Unknown | nan |
CVE-2016-6137 | An unspecified function in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands via unknown vectors, aka SAP Security Note 2203591. | 2016-09-27 | 2026-05-06 | UNKNOWN | sap/trex:7.10 | http://onapsis.com/research/security-advisories/sap-trex-remote-command-execution|http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html|http://seclists.org/fulldisclosure/2016/Aug/113|http://seclists.org/fulldisclosure/2016/Aug/85|http://onapsis.com/research/security-adviso... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | sap/trex | False | Unknown | nan |
CVE-2016-6330 | The server in Red Hat JBoss Operations Network (JON), when SSL authentication is not configured for JON server / agent communication, allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization. NOTE: this vulnerability exists because of an incomplete fix for CVE-201... | 2016-09-27 | 2026-05-06 | CWE-502 | redhat/jboss_operations_network:3.0|redhat/jboss_operations_network:3.0.1|redhat/jboss_operations_network:3.1|redhat/jboss_operations_network:3.1.1|redhat/jboss_operations_network:3.1.2|redhat/jboss_operations_network:3.1.4|redhat/jboss_operations_network:3.2.0|redhat/jboss_operations_network:3.2.1|redhat/jboss_operati... | http://www.securityfocus.com/bid/92568|https://bugzilla.redhat.com/show_bug.cgi?id=1368864|https://www.tenable.com/security/research/tra-2016-22|http://www.securityfocus.com/bid/92568|https://bugzilla.redhat.com/show_bug.cgi?id=1368864 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Deserialization Vulnerability | Execution | 98.5 | CRITICAL | redhat/jboss_operations_network | False | Unknown | nan |
CVE-2016-7568 | Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls. | 2016-09-28 | 2026-05-06 | CWE-190 | libgd/libgd:*|php/php:*|php/php:*|debian/debian_linux:8.0 | http://www.debian.org/security/2016/dsa-3693|http://www.securityfocus.com/bid/93184|https://bugs.php.net/bug.php?id=73003|https://github.com/libgd/libgd/commit/40bec0f38f50e8510f5bb71a82f516d46facde03|https://github.com/libgd/libgd/issues/308 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | libgd/libgd | False | Unknown | nan |
CVE-2016-5062 | The web server in Aternity before 9.0.1 does not require authentication for getMBeansFromURL loading of Java MBeans, which allows remote attackers to execute arbitrary Java code by registering MBeans. | 2016-09-29 | 2026-05-06 | CWE-669 | aternity/aternity:* | http://www.kb.cert.org/vuls/id/706359|http://www.securityfocus.com/bid/93208|http://www.kb.cert.org/vuls/id/706359|http://www.securityfocus.com/bid/93208 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | aternity/aternity | False | Unknown | nan |
CVE-2016-6637 | Multiple cross-site request forgery (CSRF) vulnerabilities in Pivotal Cloud Foundry (PCF) before 242; UAA 2.x before 2.7.4.7, 3.x before 3.3.0.5, and 3.4.x before 3.4.4; UAA BOSH before 11.5 and 12.x before 12.5; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.... | 2016-09-30 | 2026-05-06 | CWE-352 | cloudfoundry/cloud_foundry_uaa_bosh:*|pivotal_software/cloud_foundry:*|pivotal_software/cloud_foundry_elastic_runtime:1.6.0|pivotal_software/cloud_foundry_elastic_runtime:1.6.1|pivotal_software/cloud_foundry_elastic_runtime:1.6.2|pivotal_software/cloud_foundry_elastic_runtime:1.6.3|pivotal_software/cloud_foundry_elasti... | http://www.securityfocus.com/bid/93245|https://pivotal.io/security/cve-2016-6637|http://www.securityfocus.com/bid/93245|https://pivotal.io/security/cve-2016-6637 | False | 9.6 | CRITICAL | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 2.8 | 6.0 | Cross-Site Request Forgery (CSRF) | Unknown | 77.0 | HIGH | cloudfoundry/cloud_foundry_uaa_bosh | False | Unknown | nan |
CVE-2016-4436 | Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have unspecified impact via vectors related to improper action name clean up. | 2016-10-03 | 2026-05-06 | UNKNOWN | apache/struts:2.0.0|apache/struts:2.0.1|apache/struts:2.0.2|apache/struts:2.0.3|apache/struts:2.0.4|apache/struts:2.0.5|apache/struts:2.0.6|apache/struts:2.0.7|apache/struts:2.0.8|apache/struts:2.0.9 | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282|http://www-01.ibm.com/support/docview.wss?uid=swg21987854|http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html|http://www.securityfocus.com/bid/91280|https://struts.apache.org/docs/s2-035.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | apache/struts | False | Unknown | nan |
CVE-2016-5180 | Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot. | 2016-10-03 | 2026-05-06 | CWE-787 | c-ares/c-ares:1.0.0|c-ares/c-ares:1.1.0|c-ares/c-ares:1.2.0|c-ares/c-ares:1.2.1|c-ares/c-ares:1.3.0|c-ares/c-ares:1.3.1|c-ares/c-ares:1.3.2|c-ares/c-ares:1.4.0|c-ares/c-ares:1.5.0|c-ares/c-ares:1.5.1 | http://rhn.redhat.com/errata/RHSA-2017-0002.html|http://www.debian.org/security/2016/dsa-3682|http://www.securityfocus.com/bid/93243|http://www.ubuntu.com/usn/USN-3143-1|https://c-ares.haxx.se/CVE-2016-5180.patch | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Out-of-Bounds Write | Execution | 83.5 | HIGH | c-ares/c-ares | False | Unknown | nan |
CVE-2016-5700 | Virtual servers in F5 BIG-IP systems 11.5.0, 11.5.1 before HF11, 11.5.2, 11.5.3, 11.5.4 before HF2, 11.6.0 before HF8, 11.6.1 before HF1, 12.0.0 before HF4, and 12.1.0 before HF2, when configured with the HTTP Explicit Proxy functionality or SOCKS profile, allow remote attackers to modify the system configuration, read... | 2016-10-03 | 2026-05-06 | CWE-284 | f5/big-ip_policy_enforcement_manager:11.5.0|f5/big-ip_policy_enforcement_manager:11.5.1|f5/big-ip_policy_enforcement_manager:11.5.2|f5/big-ip_policy_enforcement_manager:11.5.3|f5/big-ip_policy_enforcement_manager:11.5.4|f5/big-ip_policy_enforcement_manager:11.6.0|f5/big-ip_policy_enforcement_manager:11.6.1|f5/big-ip_po... | http://www.securityfocus.com/bid/93325|http://www.securitytracker.com/id/1036928|https://support.f5.com/kb/en-us/solutions/public/k/35/sol35520031.html|http://www.securityfocus.com/bid/93325|http://www.securitytracker.com/id/1036928 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | f5/big-ip_policy_enforcement_manager | False | Unknown | nan |
CVE-2016-1243 | Stack-based buffer overflow in the extractTree function in unADF allows remote attackers to execute arbitrary code via a long pathname. | 2016-10-03 | 2026-05-06 | CWE-119 | debian/debian_linux:7.0|debian/debian_linux:8.0|unadf_project/unadf:1.0 | http://tmp.tjjr.fi/0001-Fix-unsafe-extraction-by-using-mkdir-instead-of-shel.patch|http://www.debian.org/security/2016/dsa-3676|http://www.securityfocus.com/bid/93329|https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838248|https://lists.debian.org/debian-lts-announce/2024/03/msg00015.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | debian/debian_linux | False | Unknown | nan |
CVE-2016-5019 | CoreResponseStateManager in Apache MyFaces Trinidad 1.0.0 through 1.0.13, 1.2.x before 1.2.15, 2.0.x before 2.0.2, and 2.1.x before 2.1.2 might allow attackers to conduct deserialization attacks via a crafted serialized view state string. | 2016-10-03 | 2026-05-06 | CWE-502 | apache/myfaces_trinidad:*|apache/myfaces_trinidad:*|apache/myfaces_trinidad:*|apache/myfaces_trinidad:* | http://mail-archives.apache.org/mod_mbox/myfaces-users/201609.mbox/%3CCAM1yOjYM%2BEW3mLUfX0pNAVLfUFRAw-Bhvkp3UE5%3DEQzR8Yxsfw%40mail.gmail.com%3E|http://packetstormsecurity.com/files/138920/Apache-MyFaces-Trinidad-Information-Disclosure.html|http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html|ht... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Deserialization Vulnerability | Execution | 98.5 | CRITICAL | apache/myfaces_trinidad | False | Unknown | nan |
CVE-2016-7405 | The qstr method in the PDO driver in the ADOdb Library for PHP before 5.x before 5.20.7 might allow remote attackers to conduct SQL injection attacks via vectors related to incorrect quoting. | 2016-10-03 | 2026-05-06 | CWE-89 | adodb_project/adodb:5.00|adodb_project/adodb:5.01|adodb_project/adodb:5.02|adodb_project/adodb:5.02|adodb_project/adodb:5.03|adodb_project/adodb:5.04|adodb_project/adodb:5.04|adodb_project/adodb:5.05|adodb_project/adodb:5.06|adodb_project/adodb:5.06 | http://www.openwall.com/lists/oss-security/2016/09/07/8|http://www.openwall.com/lists/oss-security/2016/09/15/1|http://www.securityfocus.com/bid/92969|https://github.com/ADOdb/ADOdb/blob/v5.20.7/docs/changelog.md|https://github.com/ADOdb/ADOdb/commit/bd9eca9f40220f9918ec3cc7ae9ef422b3e448b8 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | adodb_project/adodb | False | Unknown | nan |
CVE-2015-1832 | XML external entity (XXE) vulnerability in the SqlXmlUtil code in Apache Derby before 10.12.1.1, when a Java Security Manager is not in place, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving XmlVTI and the XML datatype. | 2016-10-03 | 2026-05-06 | CWE-399|CWE-611 | apache/derby:10.1.1.0|apache/derby:10.1.2.1|apache/derby:10.1.3.1|apache/derby:10.2.1.6|apache/derby:10.2.2.0|apache/derby:10.3.3.0|apache/derby:10.4.1.3|apache/derby:10.4.2.0|apache/derby:10.5.1.1|apache/derby:10.5.3.0 | http://www-01.ibm.com/support/docview.wss?uid=swg21990100|http://www.securityfocus.com/bid/93132|https://issues.apache.org/jira/browse/DERBY-6807|https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E|https://lists.apache.org/thread.html/708d94141126ea... | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | NONE | HIGH | 3.9 | 5.2 | XML External Entity (XXE) | Initial Access | 95.0 | CRITICAL | apache/derby | False | Unknown | nan |
CVE-2016-8276 | Buffer overflow in the Point-to-Point Protocol over Ethernet (PPPoE) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600, when CHAP authentication is configured on the server, allows remote attackers to cause a denial of service (server restart) or ex... | 2016-10-03 | 2026-05-06 | CWE-119 | huawei/usg2100:v300r001c00|huawei/usg2100:v300r001c10|huawei/usg2200:v300r001c00|huawei/usg2200:v300r001c10|huawei/usg5100:v300r001c00|huawei/usg5100:v300r001c10|huawei/usg5500:v300r001c00|huawei/usg5500:v300r001c10 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en|http://www.securityfocus.com/bid/92962|http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en|http://www.securityfocus.com/bid/92962 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | huawei/usg2100 | False | Unknown | nan |
CVE-2016-0913 | The client in EMC Replication Manager (RM) before 5.5.3.0_01-PatchHotfix, EMC Network Module for Microsoft 3.x, and EMC Networker Module for Microsoft 8.2.x before 8.2.3.6 allows remote RM servers to execute arbitrary commands by placing a crafted script in an SMB share. | 2016-10-05 | 2026-05-06 | CWE-20 | emc/networker_module_for_microsoft_applications:*|emc/networker_module_for_microsoft_applications:3.0|emc/networker_module_for_microsoft_applications:3.0.1|emc/replication_manager:* | http://seclists.org/bugtraq/2016/Oct/6|http://www.securityfocus.com/bid/93348|http://www.securitytracker.com/id/1036940|http://seclists.org/bugtraq/2016/Oct/6|http://www.securityfocus.com/bid/93348 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | emc/networker_module_for_microsoft_applications | False | Unknown | nan |
CVE-2016-6646 | The vApp Managers web application in EMC Unisphere for VMAX Virtual Appliance 8.x before 8.3.0 and Solutions Enabler Virtual Appliance 8.x before 8.3.0 allows remote attackers to execute arbitrary code via crafted input to the (1) GetSymmCmdRequest or (2) RemoteServiceHandler class. | 2016-10-05 | 2026-05-06 | CWE-20 | dell/emc_unisphere:8.0|dell/emc_unisphere:8.1|dell/emc_unisphere:8.1.2|dell/emc_unisphere:8.2|emc/solutions_enabler:8.0|emc/solutions_enabler:8.0.3|emc/solutions_enabler:8.1|emc/solutions_enabler:8.1.2|emc/solutions_enabler:8.3|emc/unisphere:8.0.3 | http://seclists.org/bugtraq/2016/Oct/7|http://www.securityfocus.com/bid/93343|http://www.securitytracker.com/id/1036941|http://seclists.org/bugtraq/2016/Oct/7|http://www.securityfocus.com/bid/93343 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | dell/emc_unisphere | False | Unknown | nan |
CVE-2014-5414 | Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components do not restrict the number of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack. | 2016-10-05 | 2026-05-06 | CWE-307|CWE-254 | beckhoff/embedded_pc_images:-|beckhoff/twincat:- | http://www.securityfocus.com/bid/93349|https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2014-001.pdf|https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2014-002.pdf|https://download.beckhoff.com/download/document/product-security/Advisories/advisory-... | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Other | Unknown | 95.0 | CRITICAL | beckhoff/embedded_pc_images | False | Unknown | nan |
CVE-2014-5415 | Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components might allow remote attackers to obtain access via the (1) Windows CE Remote Configuration Tool, (2) CE Remote Display service, or (3) TELNET service. | 2016-10-05 | 2026-05-06 | CWE-749|CWE-264 | beckhoff/embedded_pc_images:-|beckhoff/twincat:- | http://www.securityfocus.com/bid/93349|https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2014-001.pdf|https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2014-002.pdf|https://download.beckhoff.com/download/document/product-security/Advisories/advisory-... | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Other | Unknown | 95.0 | CRITICAL | beckhoff/embedded_pc_images | False | Unknown | nan |
CVE-2016-5086 | Johnson & Johnson Animas OneTouch Ping devices allow remote attackers to bypass authentication via replay attacks. | 2016-10-05 | 2026-05-06 | CWE-287 | animas/onetouch_ping_firmware:- | http://www.kb.cert.org/vuls/id/884840|http://www.kb.cert.org/vuls/id/BLUU-A9SQRS|http://www.securityfocus.com/bid/93351|https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump|https://ics-cert.us-cert.gov/advisories/ICSMA-16-279-01 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 98.5 | CRITICAL | animas/onetouch_ping_firmware | False | Unknown | nan |
CVE-2016-5686 | Johnson & Johnson Animas OneTouch Ping devices mishandle acknowledgements, which makes it easier for remote attackers to bypass authentication via a custom communication protocol. | 2016-10-05 | 2026-05-06 | CWE-287 | animas/onetouch_ping_firmware:- | http://www.kb.cert.org/vuls/id/884840|http://www.kb.cert.org/vuls/id/BLUU-A9SQRS|http://www.securityfocus.com/bid/93351|https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump|http://www.kb.cert.org/vuls/id/884840 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 98.5 | CRITICAL | animas/onetouch_ping_firmware | False | Unknown | nan |
CVE-2016-5745 | F5 BIG-IP LTM systems 11.x before 11.2.1 HF16, 11.3.x, 11.4.x before 11.4.1 HF11, 11.5.0, 11.5.1 before HF11, 11.5.2, 11.5.3, 11.5.4 before HF2, 11.6.0 before HF8, 11.6.1 before HF1, 12.0.0 before HF4, and 12.1.0 before HF2 allow remote attackers to modify or extract system configuration files via vectors involving NAT... | 2016-10-05 | 2026-05-06 | CWE-284 | f5/big-ip_local_traffic_manager:11.0.0|f5/big-ip_local_traffic_manager:11.1.0|f5/big-ip_local_traffic_manager:11.2.0|f5/big-ip_local_traffic_manager:11.2.1|f5/big-ip_local_traffic_manager:11.3.0|f5/big-ip_local_traffic_manager:11.4.0|f5/big-ip_local_traffic_manager:11.4.1|f5/big-ip_local_traffic_manager:11.5.0|f5/big-i... | http://www.securityfocus.com/bid/94240|http://www.securitytracker.com/id/1036927|https://support.f5.com/kb/en-us/solutions/public/k/64/sol64743453.html|http://www.securityfocus.com/bid/94240|http://www.securitytracker.com/id/1036927 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | f5/big-ip_local_traffic_manager | False | Unknown | nan |
CVE-2016-7161 | Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet. | 2016-10-05 | 2026-05-06 | CWE-787 | qemu/qemu:*|qemu/qemu:2.7.0|qemu/qemu:2.7.0|qemu/qemu:2.7.0|debian/debian_linux:8.0 | http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a0d1cbdacff5df4ded16b753b38fdd9da6092968|http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html|http://www.openwall.com/lists/oss-security/2016/09/23/6|http://www.openwall.com/lists/oss-security/2016/09/23/8|http://www.securityfocus.com/bid/93141 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Out-of-Bounds Write | Execution | 98.5 | CRITICAL | qemu/qemu | False | Unknown | nan |
CVE-2016-7435 | The (1) SCTC_REFRESH_EXPORT_TAB_COMP, (2) SCTC_REFRESH_CHECK_ENV, and (3) SCTC_TMS_MAINTAIN_ALOG functions in the SCTC subpackage in SAP Netweaver 7.40 SP 12 allow remote authenticated users with certain permissions to execute arbitrary commands via vectors involving a CALL 'SYSTEM' statement, aka SAP Security Note 226... | 2016-10-05 | 2026-05-06 | CWE-264 | sap/netweaver:7.40 | http://seclists.org/fulldisclosure/2016/Oct/0|http://seclists.org/fulldisclosure/2016/Oct/1|http://seclists.org/fulldisclosure/2016/Oct/2|http://www.securityfocus.com/bid/93272|https://www.onapsis.com/blog/analyzing-sap-security-notes-march-2016 | True | 9.1 | CRITICAL | NETWORK | LOW | HIGH | NONE | CHANGED | HIGH | HIGH | HIGH | 2.3 | 6.0 | Other | Unknown | 87.0 | CRITICAL | sap/netweaver | False | Unknown | nan |
CVE-2016-7560 | The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors. | 2016-10-05 | 2026-05-06 | CWE-798 | fortinet/fortiwlc:*|fortinet/fortiwlc:7.0-9-1|fortinet/fortiwlc:7.0-10-0|fortinet/fortiwlc:8.0-5-0|fortinet/fortiwlc:8.1-2-0|fortinet/fortiwlc:8.2-4-0 | http://fortiguard.com/advisory/FG-IR-16-029|http://www.securityfocus.com/bid/93286|http://fortiguard.com/advisory/FG-IR-16-029|http://www.securityfocus.com/bid/93286 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | fortinet/fortiwlc | False | Unknown | nan |
CVE-2016-1453 | Buffer overflow in the Overlay Transport Virtualization (OTV) GRE feature in Cisco NX-OS 5.0 through 7.3 on Nexus 7000 and 7700 devices allows remote attackers to execute arbitrary code via long parameters in a packet header, aka Bug ID CSCuy95701. | 2016-10-06 | 2026-05-06 | CWE-119 | cisco/nx-os:4.1.\(2\)|cisco/nx-os:4.1.\(3\)|cisco/nx-os:4.1.\(4\)|cisco/nx-os:4.1.\(5\)|cisco/nx-os:4.2\(3\)|cisco/nx-os:4.2\(4\)|cisco/nx-os:4.2\(6\)|cisco/nx-os:4.2\(8\)|cisco/nx-os:4.2.\(2a\)|cisco/nx-os:5.0\(2a\) | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-otv|http://www.securityfocus.com/bid/93409|http://www.securitytracker.com/id/1036946|http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-otv|http://www.securityfocus.com/bid/93409 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | cisco/nx-os | False | Unknown | nan |
CVE-2015-1000000 | Remote file upload vulnerability in mailcwp v1.99 wordpress plugin | 2016-10-06 | 2026-05-06 | CWE-434 | mailcwp_project/mailcwp:1.99 | http://www.vapidlabs.com/advisory.php?v=138|http://www.vapidlabs.com/advisory.php?v=138 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unrestricted File Upload | Initial Access | 98.5 | CRITICAL | mailcwp_project/mailcwp | False | Unknown | nan |
CVE-2015-1000001 | Remote file upload vulnerability in fast-image-adder v1.1 Wordpress plugin | 2016-10-06 | 2026-05-06 | CWE-434 | fast-image-adder_project/fast-image-adder:* | http://www.securityfocus.com/bid/96554|http://www.vapidlabs.com/advisory.php?v=139|http://www.securityfocus.com/bid/96554|http://www.vapidlabs.com/advisory.php?v=139 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unrestricted File Upload | Initial Access | 98.5 | CRITICAL | fast-image-adder_project/fast-image-adder | False | Unknown | nan |
CVE-2015-1000003 | Blind SQL Injection in filedownload v1.4 wordpress plugin | 2016-10-06 | 2026-05-06 | CWE-89 | filedownload_project/filedownload:1.4 | http://www.securityfocus.com/bid/97106|http://www.vapidlabs.com/advisory.php?v=140|http://www.securityfocus.com/bid/97106|http://www.vapidlabs.com/advisory.php?v=140 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | filedownload_project/filedownload | False | Unknown | nan |
CVE-2015-1000009 | Open proxy in Wordpress plugin google-adsense-and-hotel-booking v1.05 | 2016-10-06 | 2026-05-06 | CWE-284 | google-adsense-and-hotel-booking_project/google-adsense-and-hotel-booking:1.05 | http://www.vapidlabs.com/advisory.php?v=151|http://www.vapidlabs.com/advisory.php?v=151 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | HIGH | HIGH | 3.9 | 5.2 | Other | Unknown | 95.0 | CRITICAL | google-adsense-and-hotel-booking_project/google-adsense-and-hotel-booking | False | Unknown | nan |
CVE-2015-1000011 | Blind SQL Injection in wordpress plugin dukapress v2.5.9 | 2016-10-06 | 2026-05-06 | CWE-89 | dukapress_project/dukapress:2.5.9 | http://www.securityfocus.com/bid/94567|http://www.vapidlabs.com/advisory.php?v=152|http://www.securityfocus.com/bid/94567|http://www.vapidlabs.com/advisory.php?v=152 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | dukapress_project/dukapress | False | Unknown | nan |
CVE-2016-1000112 | Unauthenticated remote .jpg file upload in contus-video-comments v1.0 wordpress plugin | 2016-10-06 | 2026-05-06 | CWE-22 | contussupport/contus-video-comments:1.0 | http://www.securityfocus.com/bid/93967|http://www.vapidlabs.com/advisory.php?v=163|http://www.securityfocus.com/bid/93967|http://www.vapidlabs.com/advisory.php?v=163 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Path Traversal | Defense Evasion | 95.0 | CRITICAL | contussupport/contus-video-comments | False | Unknown | nan |
CVE-2016-1000113 | XSS and SQLi in huge IT gallery v1.1.5 for Joomla | 2016-10-06 | 2026-05-06 | CWE-89 | huge-it/gallery:1.1.5 | http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro|http://www.securityfocus.com/bid/92102|http://www.vapidlabs.com/advisory.php?v=164|http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro|http://www.securityfocus.com/bid/92102 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | huge-it/gallery | False | Unknown | nan |
CVE-2016-1000123 | Unauthenticated SQL Injection in Huge-IT Video Gallery v1.0.9 for Joomla | 2016-10-06 | 2026-05-06 | CWE-89 | huge-it/video_gallery:1.0.9 | http://huge-it.com/joomla-video-gallery/|http://www.securityfocus.com/bid/93107|http://www.vapidlabs.com/advisory.php?v=169|https://www.exploit-db.com/exploits/42596/|http://huge-it.com/joomla-video-gallery/ | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | huge-it/video_gallery | False | Unknown | nan |
CVE-2016-1000124 | Unauthenticated SQL Injection in Huge-IT Portfolio Gallery Plugin v1.0.6 | 2016-10-06 | 2026-05-06 | CWE-89 | huge-it/portfolio_gallery:1.0.6 | http://huge-it.com/joomla-portfolio-gallery/|http://www.securityfocus.com/bid/93268|http://www.vapidlabs.com/advisory.php?v=170|https://www.exploit-db.com/exploits/42597/|http://huge-it.com/joomla-portfolio-gallery/ | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | huge-it/portfolio_gallery | False | Unknown | nan |
CVE-2016-1000125 | Unauthenticated SQL Injection in Huge-IT Catalog v1.0.7 for Joomla | 2016-10-06 | 2026-05-06 | CWE-89 | huge-it/huge-it_catalog:1.0.7 | http://huge-it.com/joomla-catalog/|http://www.vapidlabs.com/advisory.php?v=171|https://www.exploit-db.com/exploits/42598/|http://huge-it.com/joomla-catalog/|http://www.vapidlabs.com/advisory.php?v=171 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | huge-it/huge-it_catalog | False | Unknown | nan |
CVE-2016-1000217 | Zotpress plugin for WordPress SQLi in zp_get_account() | 2016-10-06 | 2026-05-06 | CWE-89 | zotpress_project/zotpress:* | http://www.securityfocus.com/bid/93894|https://wordpress.org/plugins/zotpress/changelog/|https://wordpress.org/support/topic/sql-injection-in-api_user_id/|http://www.securityfocus.com/bid/93894|https://wordpress.org/plugins/zotpress/changelog/ | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | zotpress_project/zotpress | False | Unknown | nan |
CVE-2016-7167 | Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow. | 2016-10-07 | 2026-05-06 | CWE-190 | fedoraproject/fedora:23|fedoraproject/fedora:24|fedoraproject/fedora:25|haxx/libcurl:* | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html|http://www.securityfocus.com/bid/92975|http://www.securitytracker.com/id/1036813|http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.538632|https://access.redhat.com/errata/RHSA-2017:2016 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | fedoraproject/fedora | False | Unknown | nan |
CVE-2016-1000003 | Mirror Manager version 0.7.2 and older is vulnerable to remote code execution in the checkin code. | 2016-10-07 | 2026-05-06 | CWE-94 | mirror_manager_project/mirror_manager:* | https://github.com/fedora-infra/mirrormanager2/commit/2e227f6023477cbdbefd577f15d0846aa40c8775.patch|https://github.com/fedora-infra/mirrormanager2/commit/eb9b542bc818071b9eee41c3583b7e6e172b3a53.patch|https://github.com/fedora-infra/mirrormanager2/commit/2e227f6023477cbdbefd577f15d0846aa40c8775.patch|https://github.co... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Code Injection | Execution | 98.5 | CRITICAL | mirror_manager_project/mirror_manager | False | Unknown | nan |
CVE-2016-3926 | Unspecified vulnerability in a Qualcomm component in Android before 2016-10-05 on Nexus 5, 5X, 6, and 6P devices has unknown impact and attack vectors, aka internal bug 28823953. | 2016-10-10 | 2026-05-06 | UNKNOWN | google/android:* | http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93333|http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93333 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3927 | Unspecified vulnerability in a Qualcomm component in Android before 2016-10-05 on Nexus 5X and 6P devices has unknown impact and attack vectors, aka internal bug 28823244. | 2016-10-10 | 2026-05-06 | UNKNOWN | google/android:* | http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93333|http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93333 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-3929 | Unspecified vulnerability in a Qualcomm component in Android before 2016-10-05 on Nexus 5X and 6P devices has unknown impact and attack vectors, aka internal bug 28823675. | 2016-10-10 | 2026-05-06 | UNKNOWN | google/android:* | http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93333|http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93333 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 83.5 | HIGH | google/android | False | Unknown | nan |
CVE-2016-5343 | drivers/soc/qcom/qdsp6v2/voice_svc.c in the QDSP6v2 Voice Service driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a writ... | 2016-10-10 | 2026-05-06 | CWE-120 | linux/linux_kernel:* | http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93330|https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=6927e2e0af4dcac357be86ba563c9ae12354bb08|https://www.codeaurora.org/multiple-memory-corruption-issues-write-operation-qdsp6v2-voice-service-driver-cve-2016-... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Unknown | 98.5 | CRITICAL | linux/linux_kernel | False | Unknown | nan |
CVE-2016-6691 | service/jni/com_android_server_wifi_Gbk2Utf.cpp in the Qualcomm Wi-Fi gbk2utf module in Android before 2016-10-05 allows remote attackers to cause a denial of service (framework crash) or possibly have unspecified other impact via an access point that has a malformed SSID with GBK encoding, aka Qualcomm internal bug CR... | 2016-10-10 | 2026-05-06 | CWE-172 | google/android:* | http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93330|https://source.codeaurora.org/quic/la//platform/frameworks/opt/net/wifi/commit/?id=343f123c396b2a97fc7cce396cd5d99365cb9131|http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/9333... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | google/android | False | Unknown | nan |
CVE-2016-6692 | drivers/video/msm/mdss/mdss_mdp_pp.c in the Qualcomm MDSS driver in Android before 2016-10-05 allows attackers to cause a denial of service (invalid pointer access) or possibly have unspecified other impact via unknown vectors, aka Qualcomm internal bug CR 1004933. | 2016-10-10 | 2026-05-06 | CWE-476 | google/android:* | http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93330|https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=0f0e7047d39f9fb3a1a7f389918ff79cdb4a50b3|http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93330 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | NULL Pointer Dereference | Unknown | 98.5 | CRITICAL | google/android | False | Unknown | nan |
CVE-2016-6693 | sound/soc/msm/qdsp6v2/msm-ds2-dap-config.c in a Qualcomm QDSP6v2 driver in Android before 2016-10-05 allows attackers to cause a denial of service or possibly have unspecified other impact via an invalid data length, aka Qualcomm internal bug CR 1027585. | 2016-10-10 | 2026-05-06 | CWE-20 | google/android:* | http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93330|https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=ac328eb631fa74a63d5d2583e6bfeeb5a7a2df65|http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93330 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | google/android | False | Unknown | nan |
CVE-2016-6694 | sound/soc/msm/qdsp6v2/msm-ds2-dap-config.c in a Qualcomm QDSP6v2 driver in Android before 2016-10-05 allows attackers to cause a denial of service or possibly have unspecified other impact via crafted parameter data, aka Qualcomm internal bug CR 1033525. | 2016-10-10 | 2026-05-06 | CWE-20 | google/android:* | http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93330|https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=961e38553aae8ba9b1af77c7a49acfbb7b0b6f62|http://source.android.com/security/bulletin/2016-10-01.html|http://www.securityfocus.com/bid/93330 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Input Validation | Unknown | 98.5 | CRITICAL | google/android | False | Unknown | nan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.