Weekly Vulnerabilities Reports > January 4 to 10, 2016

Overview

124 new vulnerabilities reported during this period, including 13 critical vulnerabilities and 27 high severity vulnerabilities. This weekly summary report vulnerabilities in 218 products from 48 vendors including Wireshark, Google, Apple, HP, and Typo3. Vulnerabilities are notably categorized as "Improper Input Validation", "Permissions, Privileges, and Access Controls", "Improper Restriction of Operations within the Bounds of a Memory Buffer", "Cross-site Scripting", and "Information Exposure".

  • 56 reported vulnerabilities are remotely exploitables.
  • 6 reported vulnerabilities have public exploit available.
  • 23 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
  • 101 reported vulnerabilities are exploitable by an anonymous user.
  • Wireshark has the most reported vulnerabilities, with 33 reported vulnerabilities.
  • Redhat has the most reported critical vulnerabilities, with 3 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

13 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2016-01-08 CVE-2015-7541 Colorscore Project Command Injection vulnerability in Colorscore Project Colorscore

The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable.

10.0
2016-01-09 CVE-2015-7938 Advantech Improper Authentication vulnerability in Advantech Eki-1321 Series Firmware and Eki-1322 Series Firmware

Advantech EKI-132x devices with firmware before 2015-12-31 allow remote attackers to bypass authentication via unspecified vectors.

9.8
2016-01-08 CVE-2015-8668 Libtiff
Oracle
Redhat
Out-of-bounds Write vulnerability in multiple products

Heap-based buffer overflow in the PackBitsPreEncode function in tif_packbits.c in bmp2tiff in libtiff 4.0.6 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via a large width field in a BMP image.

9.8
2016-01-08 CVE-2015-7554 Libtiff 7PK - Security Features vulnerability in Libtiff 4.0.6

The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.

9.8
2016-01-08 CVE-2015-5254 Redhat
Apache
Fedoraproject
Improper Input Validation vulnerability in multiple products

Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object.

9.8
2016-01-08 CVE-2015-8261 Progress SQL Injection vulnerability in Progress Whatsup Gold 16.3

The DroneDeleteOldMeasurements implementation in Ipswitch WhatsUp Gold before 16.4 does not properly validate serialized XML objects, which allows remote attackers to conduct SQL injection attacks via a crafted SOAP request.

9.8
2016-01-06 CVE-2015-6642 Google Permissions, Privileges, and Access Controls vulnerability in Google Android 5.1.0/6.0/6.0.1

The kernel in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24157888.

9.8
2016-01-06 CVE-2015-6636 Google Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android

mediaserver in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 25070493 and 24686670.

9.8
2016-01-09 CVE-2015-7939 Unitronics Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Unitronics Visilogic Oplc IDE 9.8.0.00

Heap-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.09 allows remote attackers to execute arbitrary code via a long vlp filename.

9.6
2016-01-08 CVE-2015-8753 SAP Permissions, Privileges, and Access Controls vulnerability in SAP Afaria 7.0.6001.5

SAP Afaria 7.0.6001.5 allows remote attackers to bypass authorization checks and wipe or lock mobile devices via a crafted request, related to "Insecure signature," aka SAP Security Note 2134905.

9.1
2016-01-08 CVE-2015-7512 Qemu
Redhat
Debian
Oracle
Classic Buffer Overflow vulnerability in multiple products

Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.

9.0
2016-01-08 CVE-2015-8557 Canonical
Pygments
OS Command Injection vulnerability in multiple products

The FontManager._get_nix_font_path function in formatters/img.py in Pygments 1.2.2 through 2.0.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a font name.

9.0
2016-01-08 CVE-2015-8761 Values Project Code Injection vulnerability in Values Project Values 7.X1.0/7.X1.1

The Values module 7.x-1.x before 7.x-1.2 for Drupal does not properly check permissions, which allows remote administrators with the "Import value sets" permission to execute arbitrary PHP code via the exported values list in a ctools import.

9.0

27 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2016-01-10 CVE-2015-7465 IBM Cross-Site Request Forgery (CSRF) vulnerability in IBM Jazz Reporting Service 6.0

Cross-site request forgery (CSRF) vulnerability in Lifecycle Query Engine (LQE) in IBM Jazz Reporting Service (JRS) 6.0 before 6.0.0-Rational-CLM-ifix005 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.

8.8
2016-01-05 CVE-2015-5445 HP Cross-Site Request Forgery (CSRF) vulnerability in HP Storeonce Backup System Software 3.13.0

Cross-site request forgery (CSRF) vulnerability in HP StoreOnce Backup system software before 3.13.1 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.

8.8
2016-01-08 CVE-2015-4694 ZIP Attachments Project Path Traversal vulnerability in ZIP Attachments Project ZIP Attachments 1.5

Directory traversal vulnerability in download.php in the Zip Attachments plugin before 1.5.1 for WordPress allows remote attackers to read arbitrary files via a ..

8.6
2016-01-08 CVE-2015-5259 Apache Numeric Errors vulnerability in Apache Subversion 1.9.0/1.9.1/1.9.2

Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.

8.6
2016-01-08 CVE-2016-1499 Owncloud Resource Management Errors vulnerability in Owncloud

ownCloud Server before 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2 allow remote authenticated users to obtain sensitive information from a directory listing and possibly cause a denial of service (CPU consumption) via the force parameter to index.php/apps/files/ajax/scan.php.

8.5
2016-01-08 CVE-2015-8612 Blueman Project Permissions, Privileges, and Access Controls vulnerability in Blueman Project Blueman 1.99/2.0

The EnableNetwork method in the Network class in plugins/mechanism/Network.py in Blueman before 2.0.3 allows local users to gain privileges via the dhcp_handler argument.

8.4
2016-01-08 CVE-2015-6862 HP Improper Access Control vulnerability in HP Ucmdb Browser 4.0.1

HPE UCMDB Browser before 4.02 allows remote attackers to obtain sensitive information or bypass intended access restrictions via unspecified vectors.

8.4
2016-01-05 CVE-2015-6860 HP Permissions, Privileges, and Access Controls vulnerability in HP products

HPE Network Switches with software 15.16.x and 15.17.x allow local users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-6859.

8.4
2016-01-08 CVE-2015-8765 Mcafee Unspecified vulnerability in Mcafee Epolicy Orchestrator

Intel McAfee ePolicy Orchestrator (ePO) 4.6.9 and earlier, 5.0.x, 5.1.x before 5.1.3 Hotfix 1106041, and 5.3.x before 5.3.1 Hotfix 1106041 allow remote attackers to execute arbitrary code via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

8.3
2016-01-08 CVE-2014-8886 AVM Cryptographic Issues vulnerability in AVM Fritz! OS 6.23

AVM FRITZ!OS before 6.30 extracts the contents of firmware updates before verifying their cryptographic signature, which allows remote attackers to create symlinks or overwrite critical files, and consequently execute arbitrary code, via a crafted firmware image.

8.1
2016-01-08 CVE-2015-7754 Juniper Improper Input Validation vulnerability in Juniper Screenos 6.3.0

Juniper ScreenOS before 6.3.0r21, when ssh-pka is configured and enabled, allows remote attackers to cause a denial of service (system crash) or execute arbitrary code via crafted SSH negotiation.

8.1
2016-01-08 CVE-2015-7362 Fortinet Permissions, Privileges, and Access Controls vulnerability in Fortinet Forticlient

Fortinet FortiClient Linux SSLVPN before build 2313, when installed on Linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program.

7.8
2016-01-08 CVE-2015-6856 Dell Permissions, Privileges, and Access Controls vulnerability in Dell Pre-Boot Authentication Driver 1.0.1.5

Dell Pre-Boot Authentication Driver (PBADRV.sys) 1.0.1.5 allows local users to write to arbitrary physical memory locations and gain privileges via a 0x0022201c IOCTL call.

7.8
2016-01-08 CVE-2016-1131 DX Library Project Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in DX Library Project DX Library 3.15E

Buffer overflow in the CL_vsprintf function in Takumi Yamada DX Library before 3.16 allows remote attackers to execute arbitrary code via a crafted string.

7.8
2016-01-06 CVE-2015-6647 Google Permissions, Privileges, and Access Controls vulnerability in Google Android

The Widevine QSEE TrustZone application in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to gain privileges via a crafted application that leverages QSEECOM access, aka internal bug 24441554.

7.8
2016-01-06 CVE-2015-6640 Google Permissions, Privileges, and Access Controls vulnerability in Google Android

The prctl_set_vma_anon_name function in kernel/sys.c in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 does not ensure that only one vma is accessed in a certain update action, which allows attackers to gain privileges or cause a denial of service (vma list corruption) via a crafted application, aka internal bug 20017123.

7.8
2016-01-06 CVE-2015-6639 Google Permissions, Privileges, and Access Controls vulnerability in Google Android

The Widevine QSEE TrustZone application in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to gain privileges via a crafted application that leverages QSEECOM access, aka internal bug 24446875.

7.8
2016-01-06 CVE-2015-6638 Google Permissions, Privileges, and Access Controls vulnerability in Google Android

The Imagination Technologies driver in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to gain privileges via a crafted application, aka internal bug 24673908.

7.8
2016-01-06 CVE-2015-6637 Google Permissions, Privileges, and Access Controls vulnerability in Google Android

The MediaTek misc-sd driver in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to gain privileges via a crafted application, aka internal bug 25307013.

7.8
2016-01-05 CVE-2015-6859 HP Permissions, Privileges, and Access Controls vulnerability in HP Network Switch Software 15.18.0

HPE Network Switches with software 15.16.x and 15.17.x allow local users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-6860.

7.8
2016-01-08 CVE-2015-8754 Acquia Permissions, Privileges, and Access Controls vulnerability in Acquia Mollom

The Mollom module 6.x-2.7 before 6.x-2.15 for Drupal allows remote attackers to bypass intended access restrictions and modify the mollom blacklist via unspecified vectors.

7.5
2016-01-08 CVE-2015-8547 Quassel IRC
Opensuse
Code vulnerability in multiple products

The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query.

7.5
2016-01-05 CVE-2015-6861 Eucalyptus Permissions, Privileges, and Access Controls vulnerability in Eucalyptus

HPE Helion Eucalyptus 3.4.0 through 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account.

7.5
2016-01-05 CVE-2015-5446 HP Unspecified vulnerability in HP Storeonce Backup System Software 3.13.0

HP StoreOnce Backup system software before 3.13.1 allows remote attackers to execute arbitrary code via unspecified vectors.

7.5
2016-01-05 CVE-2015-6432 Cisco Resource Management Errors vulnerability in Cisco IOS XR

Cisco IOS XR 4.2.0, 4.3.0, 5.0.0, 5.1.0, 5.2.0, 5.2.2, 5.2.4, 5.3.0, and 5.3.2 does not properly restrict the number of Path Computation Elements (PCEs) for OSPF LSA opaque area updates, which allows remote attackers to cause a denial of service (device reload) via a crafted update, aka Bug ID CSCuw83486.

7.5
2016-01-10 CVE-2015-7397 IBM Unspecified vulnerability in IBM Websphere Commerce 7.0

Multiple open redirect vulnerabilities in the Aurora starter store in IBM WebSphere Commerce 7.0 through Feature Pack 8 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referrer parameter.

7.4
2016-01-08 CVE-2015-8597 Bluecoat Unspecified vulnerability in Bluecoat Advanced Secure Gateway and Proxysg

Open redirect vulnerability in Blue Coat ProxySG 6.5 before 6.5.8.8 and 6.6 and Advanced Secure Gateway (ASG) 6.6 might allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a base64-encoded URL in conjunction with a "clear text" one in a coaching page, as demonstrated by "http://www.%humbug-URL%.local/bluecoat-splash-API?%BASE64-URL%."

7.4

76 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2016-01-05 CVE-2014-5040 Eucalyptus Permissions, Privileges, and Access Controls vulnerability in Eucalyptus 4.1.1/4.2.0

HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID.

6.8
2016-01-09 CVE-2015-7117 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime

Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, and CVE-2015-7092.

6.6
2016-01-09 CVE-2015-7092 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime

Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via a crafted TXXX frame within an ID3 tag in MP3 data in a movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, and CVE-2015-7117.

6.6
2016-01-09 CVE-2015-7091 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime

Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7092, and CVE-2015-7117.

6.6
2016-01-09 CVE-2015-7090 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime

Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117.

6.6
2016-01-09 CVE-2015-7089 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime

Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117.

6.6
2016-01-09 CVE-2015-7088 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime

Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117.

6.6
2016-01-09 CVE-2015-7087 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime

Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117.

6.6
2016-01-09 CVE-2015-7086 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime

Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117.

6.6
2016-01-09 CVE-2015-7085 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime

Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117.

6.6
2016-01-06 CVE-2015-6643 Google Permissions, Privileges, and Access Controls vulnerability in Google Android 5.1.1/6.0/6.0.1

Setup Wizard in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows physically proximate attackers to modify settings or bypass a reset protection mechanism via unspecified vectors, aka internal bug 25290269.

6.6
2016-01-08 CVE-2015-6433 Cisco SQL Injection vulnerability in Cisco Unified Communications Manager 11.0(0.98000.225)

SQL injection vulnerability in Cisco Unified Communications Manager 11.0(0.98000.225) allows remote authenticated users to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCut66767.

6.5
2016-01-05 CVE-2015-5434 HP Permissions, Privileges, and Access Controls vulnerability in HP products

HPE Networking Products, originally branded as Comware 5, Comware 7, H3C, or HP, allow remote attackers to bypass intended access restrictions or cause a denial of service via "Virtual routing and forwarding (VRF) hopping."

6.5
2016-01-09 CVE-2015-8511 Mozilla Race Condition vulnerability in Mozilla Firefox OS

Race condition in the lockscreen feature in Mozilla Firefox OS before 2.5 allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors.

6.4
2016-01-09 CVE-2015-6933 Vmware Improper Access Control vulnerability in VMWare products

The VMware Tools HGFS (aka Shared Folders) implementation in VMware Workstation 11.x before 11.1.2, VMware Player 7.x before 7.1.2, VMware Fusion 7.x before 7.1.2, and VMware ESXi 5.0 through 6.0 allows Windows guest OS users to gain guest OS privileges or cause a denial of service (guest OS kernel memory corruption) via unspecified vectors.

6.3
2016-01-06 CVE-2015-6646 Google Resource Management Errors vulnerability in Google Android 6.0

The System V IPC implementation in the kernel in Android before 6.0 2016-01-01 allows attackers to cause a denial of service (global kernel resource consumption) by leveraging improper interaction between IPC resource allocation and the memory manager, aka internal bug 22300191, a different vulnerability than CVE-2015-7613.

6.2
2016-01-09 CVE-2015-8510 Mozilla Cross-site Scripting vulnerability in Mozilla Firefox OS

Cross-site scripting (XSS) vulnerability in the internationalization feature in the default homescreen app in Mozilla Firefox OS before 2.5 allows user-assisted remote attackers to inject arbitrary web script or HTML via a crafted web site that is mishandled during "Add to home screen" bookmarking.

6.1
2016-01-08 CVE-2016-1565 Field Group Project Cross-site Scripting vulnerability in Field Group Project Field Group

Cross-site scripting (XSS) vulnerability in the Field Group module 7.x-1.x before 7.x-1.5 for Drupal allows remote authenticated users with permission to configure field display settings to inject arbitrary web script or HTML via an element attribute.

6.1
2016-01-08 CVE-2016-1498 Owncloud Cross-site Scripting vulnerability in Owncloud

Cross-site scripting (XSS) vulnerability in the OCS discovery provider component in ownCloud Server before 7.0.12, 8.0.x before 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving a URL.

6.1
2016-01-08 CVE-2015-8766 Getsymphony Cross-site Scripting vulnerability in Getsymphony Symphony

Multiple cross-site scripting (XSS) vulnerabilities in content/content.systempreferences.php in Symphony CMS before 2.6.4 allow remote attackers to inject arbitrary web script or HTML via the (1) email_sendmail[from_name], (2) email_sendmail[from_address], (3) email_smtp[from_name], (4) email_smtp[from_address], (5) email_smtp[host], (6) email_smtp[port], (7) jit_image_manipulation[trusted_external_sites], or (8) maintenance_mode[ip_whitelist] parameters to system/preferences.

6.1
2016-01-08 CVE-2015-8376 Getsymphony Cross-site Scripting vulnerability in Getsymphony Symphony 2.6.3

Multiple cross-site scripting (XSS) vulnerabilities in Symphony CMS 2.6.3 allow remote attackers to inject arbitrary web script or HTML via the (1) Name, (2) Navigation Group, or (3) Label parameter to blueprints/sections/edit/1.

6.1
2016-01-08 CVE-2014-7151 NEX Forms Lite Project Cross-site Scripting vulnerability in Nex-Forms Lite Project Nex-Forms Lite 2.1.0

Multiple cross-site scripting (XSS) vulnerabilities in the NEX-Forms Lite plugin 2.1.0 for WordPress allow remote attackers to inject arbitrary web script or HTML via the form_fields parameter in a (1) do_edit or (2) do_insert action to wp-admin/admin-ajax.php.

6.1
2016-01-08 CVE-2014-6444 Titan Framework Project Cross-site Scripting vulnerability in Titan Framework Project Titan Framework 1.5

Multiple cross-site scripting (XSS) vulnerabilities in the Titan Framework plugin before 1.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) t parameter to iframe-googlefont-preview.php or the (2) text parameter to iframe-font-preview.php.

6.1
2016-01-08 CVE-2015-8760 Typo3 Improper Input Validation vulnerability in Typo3

The Flvplayer component in TYPO3 6.2.x before 6.2.16 allows remote attackers to embed Flash videos from external domains via unspecified vectors, aka "Cross-Site Flashing."

6.1
2016-01-08 CVE-2015-8757 Typo3 Cross-site Scripting vulnerability in Typo3

Cross-site scripting (XSS) vulnerability in the Extension Manager in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to extension data during an extension installation.

6.1
2016-01-08 CVE-2015-6434 Cisco Cross-site Scripting vulnerability in Cisco Prime Infrastructure 2.2(2)

Cisco Prime Infrastructure does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCux64856.

6.1
2016-01-09 CVE-2015-7575 Mozilla
Opensuse
Canonical
Data Processing Errors vulnerability in multiple products

Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.

5.9
2016-01-08 CVE-2015-8226 Huawei Improper Input Validation vulnerability in Huawei ALE Firmware and Gem-703L Firmware

The Joint Photographic Experts Group Processing Unit (JPU) driver in Huawei ALE smartphones with software before ALE-UL00C00B220 and ALE-TL00C01B220 and GEM-703L smartphones with software before V100R001C233B111 allows remote attackers to cause a denial of service (crash) via a crafted application with the system or camera permission, a different vulnerability than CVE-2015-8225.

5.5
2016-01-08 CVE-2015-8225 Huawei Improper Input Validation vulnerability in Huawei ALE Firmware and Gem-703L Firmware

The Joint Photographic Experts Group Processing Unit (JPU) driver in Huawei ALE smartphones with software before ALE-UL00C00B220 and ALE-TL00C01B220 and GEM-703L smartphones with software before V100R001C233B111 allows remote attackers to cause a denial of service (crash) via a crafted application with the system or camera permission, a different vulnerability than CVE-2015-8226.

5.5
2016-01-04 CVE-2015-8742 Wireshark Improper Input Validation vulnerability in Wireshark 2.0.0

The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8741 Wireshark Improper Input Validation vulnerability in Wireshark 2.0.0

The dissect_ppi function in epan/dissectors/packet-ppi.c in the PPI dissector in Wireshark 2.0.x before 2.0.1 does not initialize a packet-header data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8739 Wireshark Improper Input Validation vulnerability in Wireshark 2.0.0

The ipmi_fmt_udpport function in epan/dissectors/packet-ipmi.c in the IPMI dissector in Wireshark 2.0.x before 2.0.1 improperly attempts to access a packet scope, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.

5.5
2016-01-04 CVE-2015-8738 Wireshark Improper Input Validation vulnerability in Wireshark 2.0.0

The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in Wireshark 2.0.x before 2.0.1 does not validate the list count in an SZL response, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8737 Wireshark Improper Input Validation vulnerability in Wireshark 2.0.0

The mp2t_open function in wiretap/mp2t.c in the MP2T file parser in Wireshark 2.0.x before 2.0.1 does not validate the bit rate, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.

5.5
2016-01-04 CVE-2015-8736 Wireshark Improper Input Validation vulnerability in Wireshark 2.0.0

The mp2t_find_next_pcr function in wiretap/mp2t.c in the MP2T file parser in Wireshark 2.0.x before 2.0.1 does not reserve memory for a trailer, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file.

5.5
2016-01-04 CVE-2015-8735 Wireshark Improper Input Validation vulnerability in Wireshark 2.0.0

The get_value function in epan/dissectors/packet-btatt.c in the Bluetooth Attribute (aka BT ATT) dissector in Wireshark 2.0.x before 2.0.1 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (invalid write operation and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8734 Wireshark Improper Input Validation vulnerability in Wireshark 2.0.0

The dissect_nwp function in epan/dissectors/packet-nwp.c in the NWP dissector in Wireshark 2.0.x before 2.0.1 mishandles the packet type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8733 Wireshark Improper Input Validation vulnerability in Wireshark

The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

5.5
2016-01-04 CVE-2015-8732 Wireshark Improper Input Validation vulnerability in Wireshark

The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8731 Wireshark Improper Input Validation vulnerability in Wireshark

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8730 Wireshark Improper Input Validation vulnerability in Wireshark

epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8729 Wireshark Improper Input Validation vulnerability in Wireshark

The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

5.5
2016-01-04 CVE-2015-8728 Wireshark Improper Input Validation vulnerability in Wireshark

The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8727 Wireshark Improper Input Validation vulnerability in Wireshark

The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8726 Wireshark Improper Input Validation vulnerability in Wireshark

wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

5.5
2016-01-04 CVE-2015-8725 Wireshark Improper Input Validation vulnerability in Wireshark

The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8724 Wireshark Improper Input Validation vulnerability in Wireshark

The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8723 Wireshark Improper Input Validation vulnerability in Wireshark

The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8722 Wireshark Improper Input Validation vulnerability in Wireshark

epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8721 Wireshark Improper Input Validation vulnerability in Wireshark

Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.

5.5
2016-01-04 CVE-2015-8720 Wireshark Improper Input Validation vulnerability in Wireshark

The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8719 Wireshark Improper Input Validation vulnerability in Wireshark

The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8718 Wireshark Improper Input Validation vulnerability in Wireshark

Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the "Match MSG/RES packets for async NLM" option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8717 Wireshark Improper Input Validation vulnerability in Wireshark

The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8716 Wireshark Improper Input Validation vulnerability in Wireshark

The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8715 Wireshark Improper Input Validation vulnerability in Wireshark

epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

5.5
2016-01-04 CVE-2015-8714 Wireshark Improper Input Validation vulnerability in Wireshark

The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8713 Wireshark Improper Input Validation vulnerability in Wireshark

epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8712 Wireshark Improper Input Validation vulnerability in Wireshark

The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-8711 Wireshark Improper Input Validation vulnerability in Wireshark

epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.

5.5
2016-01-04 CVE-2015-3182 Wireshark Improper Input Validation vulnerability in Wireshark 1.10.12/1.10.13/1.10.14

epan/dissectors/packet-dec-dnart.c in the DECnet NSP/RT dissector in Wireshark 1.10.12 through 1.10.14 mishandles a certain strdup return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

5.5
2016-01-08 CVE-2015-8759 Typo3 Cross-site Scripting vulnerability in Typo3

Cross-site scripting (XSS) vulnerability in the typoLink function in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allows remote authenticated editors to inject arbitrary web script or HTML via a link field.

5.4
2016-01-08 CVE-2015-8758 Typo3 Cross-site Scripting vulnerability in Typo3

Multiple cross-site scripting (XSS) vulnerabilities in unspecified frontend components in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allow remote authenticated editors to inject arbitrary web script or HTML via unknown vectors.

5.4
2016-01-08 CVE-2015-8756 Typo3 Cross-site Scripting vulnerability in Typo3

Cross-site scripting (XSS) vulnerability in the search result view in the Indexed Search (indexed_search) component in TYPO3 6.2.x before 6.2.16 allows remote authenticated editors to inject arbitrary web script or HTML via unspecified vectors.

5.4
2016-01-08 CVE-2015-8755 Typo3 Cross-site Scripting vulnerability in Typo3

Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allow remote authenticated editors to inject arbitrary web script or HTML via unknown vectors.

5.4
2016-01-05 CVE-2015-5447 HP Cross-site Scripting vulnerability in HP Storeonce Backup System Software 3.13.0

Cross-site scripting (XSS) vulnerability in HP StoreOnce Backup system software before 3.13.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.

5.4
2016-01-04 CVE-2015-8740 Wireshark Improper Input Validation vulnerability in Wireshark 2.0.0

The dissect_tds7_colmetadata_token function in epan/dissectors/packet-tds.c in the TDS dissector in Wireshark 2.0.x before 2.0.1 does not validate the number of columns, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

5.3
2016-01-08 CVE-2015-8615 XEN 7PK - Security Features vulnerability in XEN 4.6.0

The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6 does not limit the number of printk console messages when logging the new callback method, which allows local HVM guest OS users to cause a denial of service via a large number of changes to the callback method (HVM_PARAM_CALLBACK_IRQ).

5.0
2016-01-06 CVE-2015-6645 Google Permissions, Privileges, and Access Controls vulnerability in Google Android

SyncManager in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to cause a denial of service (continuous rebooting) via a crafted application, aka internal bug 23591205.

5.0
2016-01-08 CVE-2015-7328 Puppet Information Exposure vulnerability in Puppet Enterprise

Puppet Server in Puppet Enterprise before 3.8.x before 3.8.3 and 2015.2.x before 2015.2.3 uses world-readable permissions for the private key of the Certification Authority (CA) certificate during the initial installation and configuration, which might allow local users to obtain sensitive information via unspecified vectors.

4.7
2016-01-09 CVE-2015-8512 Mozilla Improper Access Control vulnerability in Mozilla Firefox OS

The lockscreen feature in Mozilla Firefox OS before 2.5 does not properly restrict failed authentication attempts, which makes it easier for physically proximate attackers to obtain access by entering many passcode guesses.

4.6
2016-01-10 CVE-2015-7116 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X and Tvos

libxml2 in Apple iOS before 9.2, OS X before 10.11.2, and tvOS before 9.1 allows remote attackers to obtain sensitive information or cause a denial of service (memory corruption) via a crafted XML document, a different vulnerability than CVE-2015-7115.

4.3
2016-01-10 CVE-2015-7115 Apple Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS

libxml2 in Apple iOS before 9.2, OS X before 10.11.2, and tvOS before 9.1 allows remote attackers to obtain sensitive information or cause a denial of service (memory corruption) via a crafted XML document, a different vulnerability than CVE-2015-7116.

4.3
2016-01-08 CVE-2016-1501 Owncloud Information Exposure vulnerability in Owncloud

ownCloud Server before 8.0.9 and 8.1.x before 8.1.4 allow remote authenticated users to obtain sensitive information via unspecified vectors, which reveals the installation path in the resulting exception messages.

4.3
2016-01-06 CVE-2015-5310 Google Information Exposure vulnerability in Google Android

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

4.3
2016-01-08 CVE-2015-8303 Huawei Information Exposure vulnerability in Huawei Document Security Management V100R002C03Spc005

Huawei Document Security Management (DSM) with software before V100R002C05SPC661 does not clear the clipboard when closing a secure file, which allows local users to obtain sensitive information by pasting the contents to another file.

4.0

8 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2016-01-08 CVE-2015-7519 Phusionpassenger Improper Input Validation vulnerability in Phusionpassenger Phusion Passenger

agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.

3.7
2016-01-05 CVE-2015-6858 HP Information Exposure vulnerability in HP Insight Management 7.4

HP Insight Control server provisioning before 7.5.0 RabbitMQ allows remote attackers to obtain sensitive information via unspecified vectors.

3.7
2016-01-08 CVE-2015-7758 Opensuse
Gummi Project
Link Following vulnerability in multiple products

Gummi 0.6.5 allows local users to write to arbitrary files via a symlink attack on a temporary dot file that uses the name of an existing file and a (1) .aux, (2) .log, (3) .out, (4) .pdf, or (5) .toc extension for the file name, as demonstrated by .thesis.tex.aux.

3.3
2016-01-06 CVE-2015-6644 Google Information Exposure vulnerability in Google Android

Bouncy Castle in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information via a crafted application, aka internal bug 24106146.

3.3
2016-01-10 CVE-2015-7466 IBM Injection vulnerability in IBM Jazz Reporting Service 6.0

Lifecycle Query Engine (LQE) in IBM Jazz Reporting Service (JRS) 6.0 before 6.0.0-Rational-CLM-ifix005 allows remote authenticated users to conduct LDAP injection attacks, and consequently bypass intended query restrictions or modify the LDAP directory, via unspecified vectors.

3.1
2016-01-08 CVE-2016-1500 Owncloud Information Exposure vulnerability in Owncloud

ownCloud Server before 7.0.12, 8.0.x before 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2, when the "file_versions" application is enabled, does not properly check the return value of getOwner, which allows remote authenticated users to read the files with names starting with ".v" and belonging to a sharing user by leveraging an incoming share.

3.1
2016-01-08 CVE-2015-8481 Atlassian Information Exposure vulnerability in Atlassian Jira Core, Jira Server and Jira Service Desk

Atlassian JIRA Software 7.0.3, JIRA Core 7.0.3, and the bundled JIRA Service Desk 3.0.3 installer attaches the wrong image to e-mail notifications when a user views an issue with inline wiki markup referencing an image attachment, which might allow remote attackers to obtain sensitive information by updating a different issue that includes wiki markup for an external image reference.

3.1
2016-01-06 CVE-2015-6641 Google Information Exposure vulnerability in Google Android 6.0

Bluetooth in Android 6.0 before 2016-01-01 allows remote attackers to obtain sensitive Contacts information by leveraging pairing, aka internal bug 23607427.

3.1