Total
5449 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2016-6268 | 1 Trendmicro | 1 Smart Protection Server | 2024-11-21 | 7.8 High |
Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows local webserv users to execute arbitrary code with root privileges via a Trojan horse .war file in the Solr webapps directory. | ||||
CVE-2016-6211 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2024-11-21 | N/A |
The User module in Drupal 7.x before 7.44 allows remote authenticated users to gain privileges via vectors involving contributed or custom code that triggers a rebuild of the user profile form. | ||||
CVE-2016-6193 | 1 Huawei | 1 P8 Smartphone Firmware | 2024-11-21 | N/A |
Buffer overflow in the Wi-Fi driver in Huawei P8 smartphones with software before GRA-CL00C92B363 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6192. | ||||
CVE-2016-6192 | 1 Huawei | 1 P8 Smartphone Firmware | 2024-11-21 | N/A |
Buffer overflow in the Wi-Fi driver in Huawei P8 smartphones with software before GRA-CL00C92B363 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6193. | ||||
CVE-2016-6187 | 1 Linux | 1 Linux Kernel | 2024-11-21 | 7.8 High |
The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook. | ||||
CVE-2016-6112 | 1 Ibm | 3 Distributed Marketing, Marketing Operations, Marketing Platform | 2024-11-21 | N/A |
IBM Distributed Marketing and Marketing Platform 8.6, 9.0, 9.1, and 10.0 could allow an authenticated user to escalate their privileges and gain administrative permissions over the web application. IBM X-Force ID: 118282. | ||||
CVE-2016-6079 | 1 Ibm | 2 Aix, Vios | 2024-11-21 | N/A |
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. IBM APARs: IV88658, IV87981, IV88419, IV87640, IV88053. | ||||
CVE-2016-6028 | 1 Ibm | 1 Rational Collaborative Lifecycle Management | 2024-11-21 | N/A |
IBM Jazz technology based products might allow an attacker to view work item titles that they do not have privilege to view. | ||||
CVE-2016-6025 | 1 Ibm | 1 Sterling Secure Proxy | 2024-11-21 | N/A |
The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows remote attackers to obtain access by leveraging an unattended workstation to conduct a post-logoff session-reuse attack involving a modified URL. | ||||
CVE-2016-5995 | 3 Hp, Ibm, Linux | 5 Hp-ux, Aix, Db2 and 2 more | 2024-11-21 | N/A |
Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program. | ||||
CVE-2016-5991 | 1 Ibm | 1 Sterling Connect\ | 2024-11-21 | N/A |
IBM Sterling Connect:Direct 4.5.00, 4.5.01, 4.6.0 before 4.6.0.6 iFix008, and 4.7.0 before 4.7.0.4 on Windows allows local users to gain privileges via unspecified vectors. | ||||
CVE-2016-5979 | 1 Ibm | 1 Distributed Marketing | 2024-11-21 | N/A |
IBM Distributed Marketing 8.6, 9.0, and 10.0 could allow a privileged authenticated user to create an instance that gets created with security profile not valid for the templates, that results in the new instance not accessible for the intended user. IBM X-Force ID: 116379. | ||||
CVE-2016-5934 | 1 Ibm | 1 Tivoli Storage Manager Fastback | 2024-11-21 | N/A |
IBM Tivoli Storage Manager FastBack installer could allow a remote attacker to execute arbitrary code on the system. By placing a specially-crafted DLL in the victim's path, an attacker could exploit this vulnerability when the installer is executed to run arbitrary code on the system with privileges of the victim. | ||||
CVE-2016-5876 | 1 Owncloud | 1 Owncloud | 2024-11-21 | N/A |
ownCloud server before 8.2.6 and 9.x before 9.0.3, when the gallery app is enabled, allows remote attackers to download arbitrary images via a direct request. | ||||
CVE-2016-5868 | 1 Google | 1 Android | 2024-11-21 | N/A |
drivers/net/ethernet/msm/rndis_ipa.c in the Qualcomm networking driver in Android allows remote attackers to execute arbitrary code via a crafted application compromising a privileged process. | ||||
CVE-2016-5867 | 1 Google | 1 Android | 2024-11-21 | N/A |
In a sound driver in Android for MSM, Firefox OS for MSM, QRD Android, some variables are from userspace and values can be chosen that could result in stack overflow. | ||||
CVE-2016-5864 | 1 Google | 1 Android | 2024-11-21 | N/A |
In an audio driver function in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, some parameters are from userspace, and if they are set to a large value, integer overflow is possible followed by buffer overflow. In another function, a missing check for a lower bound may result in an out of bounds memory access. | ||||
CVE-2016-5863 | 1 Google | 1 Android | 2024-11-21 | N/A |
In an ioctl handler in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, several sanity checks are missing which can lead to out-of-bounds accesses. | ||||
CVE-2016-5862 | 1 Google | 1 Android | 2024-11-21 | N/A |
When a control related to codec is issued from userspace in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, the type casting is done to the container structure instead of the codec's individual structure, resulting in a device restart after kernel crash occurs. | ||||
CVE-2016-5861 | 1 Google | 1 Android | 2024-11-21 | N/A |
In a display driver in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, a variable controlled by userspace is used to calculate offsets and sizes for copy operations, which could result in heap overflow. |