Vulnerabilities > Medium

DATE CVE VULNERABILITY TITLE RISK
2016-06-25 CVE-2016-4525 Unspecified vulnerability in Advantech Webaccess
Unspecified ActiveX controls in Advantech WebAccess before 8.1_20160519 allow remote authenticated users to obtain sensitive information or modify data via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag.
local
low complexity
advantech
6.6
2016-06-24 CVE-2016-5709 Information Exposure vulnerability in Solarwinds Virtualization Manager 6.3.1
SolarWinds Virtualization Manager 6.3.1 and earlier uses weak encryption to store passwords in /etc/shadow, which allows local users with superuser privileges to obtain user passwords via a brute force attack.
local
high complexity
solarwinds CWE-200
4.7
2016-06-24 CVE-2016-5435 Resource Management Errors vulnerability in Huawei Firmware V5500R001C00
Memory leak in Huawei IPS Module, NGFW Module, NIP6300, NIP6600, and Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 V500R001C00 before V500R001C20SPC100, when in hot standby networking where two devices are not directly connected, allows remote attackers to cause a denial of service (memory consumption and reboot) via a crafted packet.
network
high complexity
huawei CWE-399
5.9
2016-06-24 CVE-2016-5021 Information Exposure vulnerability in F5 products
The iControl REST service in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF3; BIG-IP DNS 12.x before 12.0.0 HF3; BIG-IP GTM 11.5.x before 11.5.4 and 11.6.x before 11.6.1; BIG-IQ Cloud and Security 4.0.0 through 4.5.0; BIG-IQ Device 4.2.0 through 4.5.0; BIG-IQ ADC 4.5.0; BIG-IQ Centralized Management 4.6.0; and BIG-IQ Cloud and Orchestration 1.0.0 allows remote authenticated administrators to obtain sensitive information via unspecified vectors.
network
low complexity
f5 CWE-200
4.9
2016-06-23 CVE-2016-1439 Cross-site Scripting vulnerability in Cisco Unified Contact Center Enterprise
Cross-site scripting (XSS) vulnerability in the management interface in Cisco Unified Contact Center Enterprise through 10.5(2) allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCux59650.
network
low complexity
cisco CWE-79
6.1
2016-06-23 CVE-2016-1437 SQL Injection vulnerability in Cisco Prime Collaboration Deployment
SQL injection vulnerability in the SQL database in Cisco Prime Collaboration Deployment before 11.5.1 allows remote authenticated users to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCuy92549.
network
low complexity
cisco CWE-89
6.5
2016-06-23 CVE-2016-1434 Improper Input Validation vulnerability in Cisco IP Phone 8800 Series Firmware 11.0(1)
The license-certificate upload functionality on Cisco 8800 phones with software 11.0(1) allows remote authenticated users to delete arbitrary files via an invalid file, aka Bug ID CSCuz03010.
network
low complexity
cisco CWE-20
6.5
2016-06-23 CVE-2016-1428 Unspecified vulnerability in Cisco IOS XE 3.15.0S/3.16.0S/3.17.0S
Double free vulnerability in Cisco IOS XE 3.15S, 3.16S, and 3.17S allows remote authenticated users to cause a denial of service (device restart) via a sequence of crafted SNMP read requests, aka Bug ID CSCux13174.
network
low complexity
cisco
6.5
2016-06-23 CVE-2016-0914 Improper Access Control vulnerability in EMC products
EMC Documentum WebTop 6.8 before Patch 13 and 6.8.1 before Patch 02, Documentum Administrator 7.x before 7.2 Patch 13, Documentum Capital Projects 1.9 before Patch 23 and 1.10 before Patch 10, and Documentum TaskSpace 6.7 SP3 allow remote authenticated users to bypass intended access restrictions and execute arbitrary IAPI/IDQL commands via the IAPI/IDQL interface.
network
low complexity
emc CWE-284
6.3
2016-06-20 CVE-2016-2178 Information Exposure Through Discrepancy vulnerability in multiple products
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
5.5