Total
1752 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2016-4963 | 1 Xen | 1 Xen | 2024-11-21 | 1.9 LOW | 4.7 MEDIUM |
The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore. | |||||
CVE-2016-4911 | 1 Keystone | 1 Openstack Identity | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
The Fernet Token Provider in OpenStack Identity (Keystone) 9.0.x before 9.0.1 (mitaka) allows remote authenticated users to prevent revocation of a chain of tokens and bypass intended access restrictions by rescoping a token. | |||||
CVE-2016-4910 | 1 Cybozu | 1 Garoon | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
Cybozu Garoon 3.0.0 to 4.2.2 allows remote authenticated attackers to bypass access restriction to delete other operational administrators' MultiReport filters via unspecified vectors. | |||||
CVE-2016-4908 | 1 Cybozu | 1 Garoon | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
Cybozu Garoon 3.0.0 to 4.2.2 allows remote authenticated attackers to bypass access restriction to alter or delete another user's private RSS settings via unspecified vectors. | |||||
CVE-2016-4874 | 1 Cybozu | 1 Office | 2024-11-21 | 3.5 LOW | 3.5 LOW |
Cybozu Office 9.0.0 through 10.4.0 allows remote attackers to conduct a "reflected file download" attack. | |||||
CVE-2016-4850 | 1 Linecorp | 1 Line | 2024-11-21 | 6.8 MEDIUM | 8.1 HIGH |
LINE for Windows before 4.8.3 allows man-in-the-middle attackers to execute arbitrary code. | |||||
CVE-2016-4813 | 1 Netcommons | 1 Netcommons | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
NetCommons 2.4.2.1 and earlier allows remote authenticated secretariat (aka CLERK) users to gain privileges by creating a SYSTEM_ADMIN account. | |||||
CVE-2016-4811 | 1 Ntt-bp | 1 Japan Connected-free Wi-fi | 2024-11-21 | 5.1 MEDIUM | 5.6 MEDIUM |
The NTT Broadband Platform Japan Connected-free Wi-Fi application 1.15.1 and earlier for Android and 1.13.0 and earlier for iOS allows man-in-the-middle attackers to obtain API access via unspecified vectors. | |||||
CVE-2016-4810 | 1 Citrix | 2 Xenapp, Xendesktop | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Citrix Studio before 7.6.1000, Citrix XenDesktop 7.x before 7.6 LTSR Cumulative Update 1 (CU1), and Citrix XenApp 7.5 and 7.6 allow attackers to set Access Policy rules on the XenDesktop Delivery Controller via unspecified vectors. | |||||
CVE-2016-4800 | 2 Eclipse, Microsoft | 2 Jetty, Windows | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes. | |||||
CVE-2016-4760 | 2 Apple, Microsoft | 4 Iphone Os, Itunes, Safari and 1 more | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to conduct DNS rebinding attacks against non-HTTP Safari sessions by leveraging HTTP/0.9 support. | |||||
CVE-2016-4694 | 1 Apple | 2 Mac Os X, Os X Server | 2024-11-21 | 7.5 HIGH | 9.1 CRITICAL |
The Apache HTTP Server in Apple OS X before 10.12 and OS X Server before 5.2 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted CGI client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue, a related issue to CVE-2016-5387. | |||||
CVE-2016-4591 | 1 Apple | 4 Iphone Os, Safari, Tvos and 1 more | 2024-11-21 | 7.8 HIGH | 7.5 HIGH |
WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 mishandles the location variable, which allows remote attackers to access the local filesystem via unspecified vectors. | |||||
CVE-2016-4551 | 1 Sap | 3 Netweaver, Sap Aba, Sap Basis | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
The (1) SAP_BASIS and (2) SAP_ABA components 7.00 SP Level 0031 in SAP NetWeaver 2004s might allow remote attackers to spoof IP addresses written to the Security Audit Log via vectors related to the network landscape, aka SAP Security Note 2190621. | |||||
CVE-2016-4524 | 1 Abb | 1 Pcm600 | 2024-11-21 | 2.1 LOW | 6.5 MEDIUM |
ABB PCM600 before 2.7 improperly stores OPC Server IEC61850 passwords in unspecified temporary circumstances, which allows local users to obtain sensitive information via unknown vectors. | |||||
CVE-2016-4502 | 1 Envirosys | 1 Esc 8832 Data Controller | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Environmental Systems Corporation (ESC) 8832 Data Controller 3.02 and earlier allows remote attackers to bypass intended access restrictions and execute arbitrary functions via a modified parameter. | |||||
CVE-2016-4501 | 1 Envirosys | 1 Esc 8832 Data Controller | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
Environmental Systems Corporation (ESC) 8832 Data Controller 3.02 and earlier mishandles sessions, which allows remote attackers to bypass authentication and make arbitrary configuration changes via unspecified vectors. | |||||
CVE-2016-4495 | 1 Kmc Controls | 2 Bac-5051e, Bac-5051e Firmware | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
KMC Controls BAC-5051E devices with firmware before E0.2.0.2 allow remote attackers to bypass intended access restrictions and read a configuration file via unspecified vectors. | |||||
CVE-2016-4464 | 1 Apache | 1 Cxf Fediz | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature. | |||||
CVE-2016-4407 | 1 Sap | 1 Sapcryptolib | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
The DSA algorithm implementation in SAP SAPCRYPTOLIB 5.555.38 does not properly check signatures, which allows remote authenticated users to impersonate arbitrary users via unspecified vectors, aka SAP Security Note 2223008. |