Weekly Vulnerabilities Reports > January 4 to 10, 2016
Overview
124 new vulnerabilities reported during this period, including 13 critical vulnerabilities and 27 high severity vulnerabilities. This weekly summary report vulnerabilities in 218 products from 48 vendors including Wireshark, Google, Apple, HP, and Typo3. Vulnerabilities are notably categorized as "Improper Input Validation", "Permissions, Privileges, and Access Controls", "Improper Restriction of Operations within the Bounds of a Memory Buffer", "Cross-site Scripting", and "Information Exposure".
- 56 reported vulnerabilities are remotely exploitables.
- 6 reported vulnerabilities have public exploit available.
- 23 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 101 reported vulnerabilities are exploitable by an anonymous user.
- Wireshark has the most reported vulnerabilities, with 33 reported vulnerabilities.
- Redhat has the most reported critical vulnerabilities, with 3 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
13 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2016-01-08 | CVE-2015-7541 | Colorscore Project | Command Injection vulnerability in Colorscore Project Colorscore The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable. | 10.0 |
2016-01-09 | CVE-2015-7938 | Advantech | Improper Authentication vulnerability in Advantech Eki-1321 Series Firmware and Eki-1322 Series Firmware Advantech EKI-132x devices with firmware before 2015-12-31 allow remote attackers to bypass authentication via unspecified vectors. | 9.8 |
2016-01-08 | CVE-2015-8668 | Libtiff Oracle Redhat | Out-of-bounds Write vulnerability in multiple products Heap-based buffer overflow in the PackBitsPreEncode function in tif_packbits.c in bmp2tiff in libtiff 4.0.6 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via a large width field in a BMP image. | 9.8 |
2016-01-08 | CVE-2015-7554 | Libtiff | 7PK - Security Features vulnerability in Libtiff 4.0.6 The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image. | 9.8 |
2016-01-08 | CVE-2015-5254 | Redhat Apache Fedoraproject | Improper Input Validation vulnerability in multiple products Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object. | 9.8 |
2016-01-08 | CVE-2015-8261 | Progress | SQL Injection vulnerability in Progress Whatsup Gold 16.3 The DroneDeleteOldMeasurements implementation in Ipswitch WhatsUp Gold before 16.4 does not properly validate serialized XML objects, which allows remote attackers to conduct SQL injection attacks via a crafted SOAP request. | 9.8 |
2016-01-06 | CVE-2015-6642 | Permissions, Privileges, and Access Controls vulnerability in Google Android 5.1.0/6.0/6.0.1 The kernel in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24157888. | 9.8 | |
2016-01-06 | CVE-2015-6636 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android mediaserver in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 25070493 and 24686670. | 9.8 | |
2016-01-09 | CVE-2015-7939 | Unitronics | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Unitronics Visilogic Oplc IDE 9.8.0.00 Heap-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.09 allows remote attackers to execute arbitrary code via a long vlp filename. | 9.6 |
2016-01-08 | CVE-2015-8753 | SAP | Permissions, Privileges, and Access Controls vulnerability in SAP Afaria 7.0.6001.5 SAP Afaria 7.0.6001.5 allows remote attackers to bypass authorization checks and wipe or lock mobile devices via a crafted request, related to "Insecure signature," aka SAP Security Note 2134905. | 9.1 |
2016-01-08 | CVE-2015-7512 | Qemu Redhat Debian Oracle | Classic Buffer Overflow vulnerability in multiple products Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet. | 9.0 |
2016-01-08 | CVE-2015-8557 | Canonical Pygments | OS Command Injection vulnerability in multiple products The FontManager._get_nix_font_path function in formatters/img.py in Pygments 1.2.2 through 2.0.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a font name. | 9.0 |
2016-01-08 | CVE-2015-8761 | Values Project | Code Injection vulnerability in Values Project Values 7.X1.0/7.X1.1 The Values module 7.x-1.x before 7.x-1.2 for Drupal does not properly check permissions, which allows remote administrators with the "Import value sets" permission to execute arbitrary PHP code via the exported values list in a ctools import. | 9.0 |
27 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2016-01-10 | CVE-2015-7465 | IBM | Cross-Site Request Forgery (CSRF) vulnerability in IBM Jazz Reporting Service 6.0 Cross-site request forgery (CSRF) vulnerability in Lifecycle Query Engine (LQE) in IBM Jazz Reporting Service (JRS) 6.0 before 6.0.0-Rational-CLM-ifix005 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences. | 8.8 |
2016-01-05 | CVE-2015-5445 | HP | Cross-Site Request Forgery (CSRF) vulnerability in HP Storeonce Backup System Software 3.13.0 Cross-site request forgery (CSRF) vulnerability in HP StoreOnce Backup system software before 3.13.1 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors. | 8.8 |
2016-01-08 | CVE-2015-4694 | ZIP Attachments Project | Path Traversal vulnerability in ZIP Attachments Project ZIP Attachments 1.5 Directory traversal vulnerability in download.php in the Zip Attachments plugin before 1.5.1 for WordPress allows remote attackers to read arbitrary files via a .. | 8.6 |
2016-01-08 | CVE-2015-5259 | Apache | Numeric Errors vulnerability in Apache Subversion 1.9.0/1.9.1/1.9.2 Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read. | 8.6 |
2016-01-08 | CVE-2016-1499 | Owncloud | Resource Management Errors vulnerability in Owncloud ownCloud Server before 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2 allow remote authenticated users to obtain sensitive information from a directory listing and possibly cause a denial of service (CPU consumption) via the force parameter to index.php/apps/files/ajax/scan.php. | 8.5 |
2016-01-08 | CVE-2015-8612 | Blueman Project | Permissions, Privileges, and Access Controls vulnerability in Blueman Project Blueman 1.99/2.0 The EnableNetwork method in the Network class in plugins/mechanism/Network.py in Blueman before 2.0.3 allows local users to gain privileges via the dhcp_handler argument. | 8.4 |
2016-01-08 | CVE-2015-6862 | HP | Improper Access Control vulnerability in HP Ucmdb Browser 4.0.1 HPE UCMDB Browser before 4.02 allows remote attackers to obtain sensitive information or bypass intended access restrictions via unspecified vectors. | 8.4 |
2016-01-05 | CVE-2015-6860 | HP | Permissions, Privileges, and Access Controls vulnerability in HP products HPE Network Switches with software 15.16.x and 15.17.x allow local users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-6859. | 8.4 |
2016-01-08 | CVE-2015-8765 | Mcafee | Unspecified vulnerability in Mcafee Epolicy Orchestrator Intel McAfee ePolicy Orchestrator (ePO) 4.6.9 and earlier, 5.0.x, 5.1.x before 5.1.3 Hotfix 1106041, and 5.3.x before 5.3.1 Hotfix 1106041 allow remote attackers to execute arbitrary code via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library. | 8.3 |
2016-01-08 | CVE-2014-8886 | AVM | Cryptographic Issues vulnerability in AVM Fritz! OS 6.23 AVM FRITZ!OS before 6.30 extracts the contents of firmware updates before verifying their cryptographic signature, which allows remote attackers to create symlinks or overwrite critical files, and consequently execute arbitrary code, via a crafted firmware image. | 8.1 |
2016-01-08 | CVE-2015-7754 | Juniper | Improper Input Validation vulnerability in Juniper Screenos 6.3.0 Juniper ScreenOS before 6.3.0r21, when ssh-pka is configured and enabled, allows remote attackers to cause a denial of service (system crash) or execute arbitrary code via crafted SSH negotiation. | 8.1 |
2016-01-08 | CVE-2015-7362 | Fortinet | Permissions, Privileges, and Access Controls vulnerability in Fortinet Forticlient Fortinet FortiClient Linux SSLVPN before build 2313, when installed on Linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program. | 7.8 |
2016-01-08 | CVE-2015-6856 | Dell | Permissions, Privileges, and Access Controls vulnerability in Dell Pre-Boot Authentication Driver 1.0.1.5 Dell Pre-Boot Authentication Driver (PBADRV.sys) 1.0.1.5 allows local users to write to arbitrary physical memory locations and gain privileges via a 0x0022201c IOCTL call. | 7.8 |
2016-01-08 | CVE-2016-1131 | DX Library Project | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in DX Library Project DX Library 3.15E Buffer overflow in the CL_vsprintf function in Takumi Yamada DX Library before 3.16 allows remote attackers to execute arbitrary code via a crafted string. | 7.8 |
2016-01-06 | CVE-2015-6647 | Permissions, Privileges, and Access Controls vulnerability in Google Android The Widevine QSEE TrustZone application in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to gain privileges via a crafted application that leverages QSEECOM access, aka internal bug 24441554. | 7.8 | |
2016-01-06 | CVE-2015-6640 | Permissions, Privileges, and Access Controls vulnerability in Google Android The prctl_set_vma_anon_name function in kernel/sys.c in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 does not ensure that only one vma is accessed in a certain update action, which allows attackers to gain privileges or cause a denial of service (vma list corruption) via a crafted application, aka internal bug 20017123. | 7.8 | |
2016-01-06 | CVE-2015-6639 | Permissions, Privileges, and Access Controls vulnerability in Google Android The Widevine QSEE TrustZone application in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to gain privileges via a crafted application that leverages QSEECOM access, aka internal bug 24446875. | 7.8 | |
2016-01-06 | CVE-2015-6638 | Permissions, Privileges, and Access Controls vulnerability in Google Android The Imagination Technologies driver in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to gain privileges via a crafted application, aka internal bug 24673908. | 7.8 | |
2016-01-06 | CVE-2015-6637 | Permissions, Privileges, and Access Controls vulnerability in Google Android The MediaTek misc-sd driver in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to gain privileges via a crafted application, aka internal bug 25307013. | 7.8 | |
2016-01-05 | CVE-2015-6859 | HP | Permissions, Privileges, and Access Controls vulnerability in HP Network Switch Software 15.18.0 HPE Network Switches with software 15.16.x and 15.17.x allow local users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-6860. | 7.8 |
2016-01-08 | CVE-2015-8754 | Acquia | Permissions, Privileges, and Access Controls vulnerability in Acquia Mollom The Mollom module 6.x-2.7 before 6.x-2.15 for Drupal allows remote attackers to bypass intended access restrictions and modify the mollom blacklist via unspecified vectors. | 7.5 |
2016-01-08 | CVE-2015-8547 | Quassel IRC Opensuse | Code vulnerability in multiple products The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query. | 7.5 |
2016-01-05 | CVE-2015-6861 | Eucalyptus | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus HPE Helion Eucalyptus 3.4.0 through 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account. | 7.5 |
2016-01-05 | CVE-2015-5446 | HP | Unspecified vulnerability in HP Storeonce Backup System Software 3.13.0 HP StoreOnce Backup system software before 3.13.1 allows remote attackers to execute arbitrary code via unspecified vectors. | 7.5 |
2016-01-05 | CVE-2015-6432 | Cisco | Resource Management Errors vulnerability in Cisco IOS XR Cisco IOS XR 4.2.0, 4.3.0, 5.0.0, 5.1.0, 5.2.0, 5.2.2, 5.2.4, 5.3.0, and 5.3.2 does not properly restrict the number of Path Computation Elements (PCEs) for OSPF LSA opaque area updates, which allows remote attackers to cause a denial of service (device reload) via a crafted update, aka Bug ID CSCuw83486. | 7.5 |
2016-01-10 | CVE-2015-7397 | IBM | Unspecified vulnerability in IBM Websphere Commerce 7.0 Multiple open redirect vulnerabilities in the Aurora starter store in IBM WebSphere Commerce 7.0 through Feature Pack 8 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referrer parameter. | 7.4 |
2016-01-08 | CVE-2015-8597 | Bluecoat | Unspecified vulnerability in Bluecoat Advanced Secure Gateway and Proxysg Open redirect vulnerability in Blue Coat ProxySG 6.5 before 6.5.8.8 and 6.6 and Advanced Secure Gateway (ASG) 6.6 might allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a base64-encoded URL in conjunction with a "clear text" one in a coaching page, as demonstrated by "http://www.%humbug-URL%.local/bluecoat-splash-API?%BASE64-URL%." | 7.4 |
76 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2016-01-05 | CVE-2014-5040 | Eucalyptus | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus 4.1.1/4.2.0 HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID. | 6.8 |
2016-01-09 | CVE-2015-7117 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, and CVE-2015-7092. | 6.6 |
2016-01-09 | CVE-2015-7092 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via a crafted TXXX frame within an ID3 tag in MP3 data in a movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, and CVE-2015-7117. | 6.6 |
2016-01-09 | CVE-2015-7091 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7092, and CVE-2015-7117. | 6.6 |
2016-01-09 | CVE-2015-7090 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117. | 6.6 |
2016-01-09 | CVE-2015-7089 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117. | 6.6 |
2016-01-09 | CVE-2015-7088 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117. | 6.6 |
2016-01-09 | CVE-2015-7087 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117. | 6.6 |
2016-01-09 | CVE-2015-7086 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117. | 6.6 |
2016-01-09 | CVE-2015-7085 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117. | 6.6 |
2016-01-06 | CVE-2015-6643 | Permissions, Privileges, and Access Controls vulnerability in Google Android 5.1.1/6.0/6.0.1 Setup Wizard in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows physically proximate attackers to modify settings or bypass a reset protection mechanism via unspecified vectors, aka internal bug 25290269. | 6.6 | |
2016-01-08 | CVE-2015-6433 | Cisco | SQL Injection vulnerability in Cisco Unified Communications Manager 11.0(0.98000.225) SQL injection vulnerability in Cisco Unified Communications Manager 11.0(0.98000.225) allows remote authenticated users to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCut66767. | 6.5 |
2016-01-05 | CVE-2015-5434 | HP | Permissions, Privileges, and Access Controls vulnerability in HP products HPE Networking Products, originally branded as Comware 5, Comware 7, H3C, or HP, allow remote attackers to bypass intended access restrictions or cause a denial of service via "Virtual routing and forwarding (VRF) hopping." | 6.5 |
2016-01-09 | CVE-2015-8511 | Mozilla | Race Condition vulnerability in Mozilla Firefox OS Race condition in the lockscreen feature in Mozilla Firefox OS before 2.5 allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors. | 6.4 |
2016-01-09 | CVE-2015-6933 | Vmware | Improper Access Control vulnerability in VMWare products The VMware Tools HGFS (aka Shared Folders) implementation in VMware Workstation 11.x before 11.1.2, VMware Player 7.x before 7.1.2, VMware Fusion 7.x before 7.1.2, and VMware ESXi 5.0 through 6.0 allows Windows guest OS users to gain guest OS privileges or cause a denial of service (guest OS kernel memory corruption) via unspecified vectors. | 6.3 |
2016-01-06 | CVE-2015-6646 | Resource Management Errors vulnerability in Google Android 6.0 The System V IPC implementation in the kernel in Android before 6.0 2016-01-01 allows attackers to cause a denial of service (global kernel resource consumption) by leveraging improper interaction between IPC resource allocation and the memory manager, aka internal bug 22300191, a different vulnerability than CVE-2015-7613. | 6.2 | |
2016-01-09 | CVE-2015-8510 | Mozilla | Cross-site Scripting vulnerability in Mozilla Firefox OS Cross-site scripting (XSS) vulnerability in the internationalization feature in the default homescreen app in Mozilla Firefox OS before 2.5 allows user-assisted remote attackers to inject arbitrary web script or HTML via a crafted web site that is mishandled during "Add to home screen" bookmarking. | 6.1 |
2016-01-08 | CVE-2016-1565 | Field Group Project | Cross-site Scripting vulnerability in Field Group Project Field Group Cross-site scripting (XSS) vulnerability in the Field Group module 7.x-1.x before 7.x-1.5 for Drupal allows remote authenticated users with permission to configure field display settings to inject arbitrary web script or HTML via an element attribute. | 6.1 |
2016-01-08 | CVE-2016-1498 | Owncloud | Cross-site Scripting vulnerability in Owncloud Cross-site scripting (XSS) vulnerability in the OCS discovery provider component in ownCloud Server before 7.0.12, 8.0.x before 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving a URL. | 6.1 |
2016-01-08 | CVE-2015-8766 | Getsymphony | Cross-site Scripting vulnerability in Getsymphony Symphony Multiple cross-site scripting (XSS) vulnerabilities in content/content.systempreferences.php in Symphony CMS before 2.6.4 allow remote attackers to inject arbitrary web script or HTML via the (1) email_sendmail[from_name], (2) email_sendmail[from_address], (3) email_smtp[from_name], (4) email_smtp[from_address], (5) email_smtp[host], (6) email_smtp[port], (7) jit_image_manipulation[trusted_external_sites], or (8) maintenance_mode[ip_whitelist] parameters to system/preferences. | 6.1 |
2016-01-08 | CVE-2015-8376 | Getsymphony | Cross-site Scripting vulnerability in Getsymphony Symphony 2.6.3 Multiple cross-site scripting (XSS) vulnerabilities in Symphony CMS 2.6.3 allow remote attackers to inject arbitrary web script or HTML via the (1) Name, (2) Navigation Group, or (3) Label parameter to blueprints/sections/edit/1. | 6.1 |
2016-01-08 | CVE-2014-7151 | NEX Forms Lite Project | Cross-site Scripting vulnerability in Nex-Forms Lite Project Nex-Forms Lite 2.1.0 Multiple cross-site scripting (XSS) vulnerabilities in the NEX-Forms Lite plugin 2.1.0 for WordPress allow remote attackers to inject arbitrary web script or HTML via the form_fields parameter in a (1) do_edit or (2) do_insert action to wp-admin/admin-ajax.php. | 6.1 |
2016-01-08 | CVE-2014-6444 | Titan Framework Project | Cross-site Scripting vulnerability in Titan Framework Project Titan Framework 1.5 Multiple cross-site scripting (XSS) vulnerabilities in the Titan Framework plugin before 1.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) t parameter to iframe-googlefont-preview.php or the (2) text parameter to iframe-font-preview.php. | 6.1 |
2016-01-08 | CVE-2015-8760 | Typo3 | Improper Input Validation vulnerability in Typo3 The Flvplayer component in TYPO3 6.2.x before 6.2.16 allows remote attackers to embed Flash videos from external domains via unspecified vectors, aka "Cross-Site Flashing." | 6.1 |
2016-01-08 | CVE-2015-8757 | Typo3 | Cross-site Scripting vulnerability in Typo3 Cross-site scripting (XSS) vulnerability in the Extension Manager in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to extension data during an extension installation. | 6.1 |
2016-01-08 | CVE-2015-6434 | Cisco | Cross-site Scripting vulnerability in Cisco Prime Infrastructure 2.2(2) Cisco Prime Infrastructure does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCux64856. | 6.1 |
2016-01-09 | CVE-2015-7575 | Mozilla Opensuse Canonical | Data Processing Errors vulnerability in multiple products Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision. | 5.9 |
2016-01-08 | CVE-2015-8226 | Huawei | Improper Input Validation vulnerability in Huawei ALE Firmware and Gem-703L Firmware The Joint Photographic Experts Group Processing Unit (JPU) driver in Huawei ALE smartphones with software before ALE-UL00C00B220 and ALE-TL00C01B220 and GEM-703L smartphones with software before V100R001C233B111 allows remote attackers to cause a denial of service (crash) via a crafted application with the system or camera permission, a different vulnerability than CVE-2015-8225. | 5.5 |
2016-01-08 | CVE-2015-8225 | Huawei | Improper Input Validation vulnerability in Huawei ALE Firmware and Gem-703L Firmware The Joint Photographic Experts Group Processing Unit (JPU) driver in Huawei ALE smartphones with software before ALE-UL00C00B220 and ALE-TL00C01B220 and GEM-703L smartphones with software before V100R001C233B111 allows remote attackers to cause a denial of service (crash) via a crafted application with the system or camera permission, a different vulnerability than CVE-2015-8226. | 5.5 |
2016-01-04 | CVE-2015-8742 | Wireshark | Improper Input Validation vulnerability in Wireshark 2.0.0 The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8741 | Wireshark | Improper Input Validation vulnerability in Wireshark 2.0.0 The dissect_ppi function in epan/dissectors/packet-ppi.c in the PPI dissector in Wireshark 2.0.x before 2.0.1 does not initialize a packet-header data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8739 | Wireshark | Improper Input Validation vulnerability in Wireshark 2.0.0 The ipmi_fmt_udpport function in epan/dissectors/packet-ipmi.c in the IPMI dissector in Wireshark 2.0.x before 2.0.1 improperly attempts to access a packet scope, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8738 | Wireshark | Improper Input Validation vulnerability in Wireshark 2.0.0 The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in Wireshark 2.0.x before 2.0.1 does not validate the list count in an SZL response, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8737 | Wireshark | Improper Input Validation vulnerability in Wireshark 2.0.0 The mp2t_open function in wiretap/mp2t.c in the MP2T file parser in Wireshark 2.0.x before 2.0.1 does not validate the bit rate, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file. | 5.5 |
2016-01-04 | CVE-2015-8736 | Wireshark | Improper Input Validation vulnerability in Wireshark 2.0.0 The mp2t_find_next_pcr function in wiretap/mp2t.c in the MP2T file parser in Wireshark 2.0.x before 2.0.1 does not reserve memory for a trailer, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file. | 5.5 |
2016-01-04 | CVE-2015-8735 | Wireshark | Improper Input Validation vulnerability in Wireshark 2.0.0 The get_value function in epan/dissectors/packet-btatt.c in the Bluetooth Attribute (aka BT ATT) dissector in Wireshark 2.0.x before 2.0.1 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (invalid write operation and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8734 | Wireshark | Improper Input Validation vulnerability in Wireshark 2.0.0 The dissect_nwp function in epan/dissectors/packet-nwp.c in the NWP dissector in Wireshark 2.0.x before 2.0.1 mishandles the packet type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8733 | Wireshark | Improper Input Validation vulnerability in Wireshark The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file. | 5.5 |
2016-01-04 | CVE-2015-8732 | Wireshark | Improper Input Validation vulnerability in Wireshark The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8731 | Wireshark | Improper Input Validation vulnerability in Wireshark The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8730 | Wireshark | Improper Input Validation vulnerability in Wireshark epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8729 | Wireshark | Improper Input Validation vulnerability in Wireshark The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file. | 5.5 |
2016-01-04 | CVE-2015-8728 | Wireshark | Improper Input Validation vulnerability in Wireshark The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8727 | Wireshark | Improper Input Validation vulnerability in Wireshark The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8726 | Wireshark | Improper Input Validation vulnerability in Wireshark wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file. | 5.5 |
2016-01-04 | CVE-2015-8725 | Wireshark | Improper Input Validation vulnerability in Wireshark The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8724 | Wireshark | Improper Input Validation vulnerability in Wireshark The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8723 | Wireshark | Improper Input Validation vulnerability in Wireshark The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8722 | Wireshark | Improper Input Validation vulnerability in Wireshark epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8721 | Wireshark | Improper Input Validation vulnerability in Wireshark Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression. | 5.5 |
2016-01-04 | CVE-2015-8720 | Wireshark | Improper Input Validation vulnerability in Wireshark The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8719 | Wireshark | Improper Input Validation vulnerability in Wireshark The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8718 | Wireshark | Improper Input Validation vulnerability in Wireshark Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the "Match MSG/RES packets for async NLM" option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8717 | Wireshark | Improper Input Validation vulnerability in Wireshark The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8716 | Wireshark | Improper Input Validation vulnerability in Wireshark The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8715 | Wireshark | Improper Input Validation vulnerability in Wireshark epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8714 | Wireshark | Improper Input Validation vulnerability in Wireshark The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8713 | Wireshark | Improper Input Validation vulnerability in Wireshark epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8712 | Wireshark | Improper Input Validation vulnerability in Wireshark The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-8711 | Wireshark | Improper Input Validation vulnerability in Wireshark epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet. | 5.5 |
2016-01-04 | CVE-2015-3182 | Wireshark | Improper Input Validation vulnerability in Wireshark 1.10.12/1.10.13/1.10.14 epan/dissectors/packet-dec-dnart.c in the DECnet NSP/RT dissector in Wireshark 1.10.12 through 1.10.14 mishandles a certain strdup return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | 5.5 |
2016-01-08 | CVE-2015-8759 | Typo3 | Cross-site Scripting vulnerability in Typo3 Cross-site scripting (XSS) vulnerability in the typoLink function in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allows remote authenticated editors to inject arbitrary web script or HTML via a link field. | 5.4 |
2016-01-08 | CVE-2015-8758 | Typo3 | Cross-site Scripting vulnerability in Typo3 Multiple cross-site scripting (XSS) vulnerabilities in unspecified frontend components in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allow remote authenticated editors to inject arbitrary web script or HTML via unknown vectors. | 5.4 |
2016-01-08 | CVE-2015-8756 | Typo3 | Cross-site Scripting vulnerability in Typo3 Cross-site scripting (XSS) vulnerability in the search result view in the Indexed Search (indexed_search) component in TYPO3 6.2.x before 6.2.16 allows remote authenticated editors to inject arbitrary web script or HTML via unspecified vectors. | 5.4 |
2016-01-08 | CVE-2015-8755 | Typo3 | Cross-site Scripting vulnerability in Typo3 Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allow remote authenticated editors to inject arbitrary web script or HTML via unknown vectors. | 5.4 |
2016-01-05 | CVE-2015-5447 | HP | Cross-site Scripting vulnerability in HP Storeonce Backup System Software 3.13.0 Cross-site scripting (XSS) vulnerability in HP StoreOnce Backup system software before 3.13.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | 5.4 |
2016-01-04 | CVE-2015-8740 | Wireshark | Improper Input Validation vulnerability in Wireshark 2.0.0 The dissect_tds7_colmetadata_token function in epan/dissectors/packet-tds.c in the TDS dissector in Wireshark 2.0.x before 2.0.1 does not validate the number of columns, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet. | 5.3 |
2016-01-08 | CVE-2015-8615 | XEN | 7PK - Security Features vulnerability in XEN 4.6.0 The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6 does not limit the number of printk console messages when logging the new callback method, which allows local HVM guest OS users to cause a denial of service via a large number of changes to the callback method (HVM_PARAM_CALLBACK_IRQ). | 5.0 |
2016-01-06 | CVE-2015-6645 | Permissions, Privileges, and Access Controls vulnerability in Google Android SyncManager in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to cause a denial of service (continuous rebooting) via a crafted application, aka internal bug 23591205. | 5.0 | |
2016-01-08 | CVE-2015-7328 | Puppet | Information Exposure vulnerability in Puppet Enterprise Puppet Server in Puppet Enterprise before 3.8.x before 3.8.3 and 2015.2.x before 2015.2.3 uses world-readable permissions for the private key of the Certification Authority (CA) certificate during the initial installation and configuration, which might allow local users to obtain sensitive information via unspecified vectors. | 4.7 |
2016-01-09 | CVE-2015-8512 | Mozilla | Improper Access Control vulnerability in Mozilla Firefox OS The lockscreen feature in Mozilla Firefox OS before 2.5 does not properly restrict failed authentication attempts, which makes it easier for physically proximate attackers to obtain access by entering many passcode guesses. | 4.6 |
2016-01-10 | CVE-2015-7116 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X and Tvos libxml2 in Apple iOS before 9.2, OS X before 10.11.2, and tvOS before 9.1 allows remote attackers to obtain sensitive information or cause a denial of service (memory corruption) via a crafted XML document, a different vulnerability than CVE-2015-7115. | 4.3 |
2016-01-10 | CVE-2015-7115 | Apple | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS libxml2 in Apple iOS before 9.2, OS X before 10.11.2, and tvOS before 9.1 allows remote attackers to obtain sensitive information or cause a denial of service (memory corruption) via a crafted XML document, a different vulnerability than CVE-2015-7116. | 4.3 |
2016-01-08 | CVE-2016-1501 | Owncloud | Information Exposure vulnerability in Owncloud ownCloud Server before 8.0.9 and 8.1.x before 8.1.4 allow remote authenticated users to obtain sensitive information via unspecified vectors, which reveals the installation path in the resulting exception messages. | 4.3 |
2016-01-06 | CVE-2015-5310 | Information Exposure vulnerability in Google Android The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response. | 4.3 | |
2016-01-08 | CVE-2015-8303 | Huawei | Information Exposure vulnerability in Huawei Document Security Management V100R002C03Spc005 Huawei Document Security Management (DSM) with software before V100R002C05SPC661 does not clear the clipboard when closing a secure file, which allows local users to obtain sensitive information by pasting the contents to another file. | 4.0 |
8 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2016-01-08 | CVE-2015-7519 | Phusionpassenger | Improper Input Validation vulnerability in Phusionpassenger Phusion Passenger agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header. | 3.7 |
2016-01-05 | CVE-2015-6858 | HP | Information Exposure vulnerability in HP Insight Management 7.4 HP Insight Control server provisioning before 7.5.0 RabbitMQ allows remote attackers to obtain sensitive information via unspecified vectors. | 3.7 |
2016-01-08 | CVE-2015-7758 | Opensuse Gummi Project | Link Following vulnerability in multiple products Gummi 0.6.5 allows local users to write to arbitrary files via a symlink attack on a temporary dot file that uses the name of an existing file and a (1) .aux, (2) .log, (3) .out, (4) .pdf, or (5) .toc extension for the file name, as demonstrated by .thesis.tex.aux. | 3.3 |
2016-01-06 | CVE-2015-6644 | Information Exposure vulnerability in Google Android Bouncy Castle in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information via a crafted application, aka internal bug 24106146. | 3.3 | |
2016-01-10 | CVE-2015-7466 | IBM | Injection vulnerability in IBM Jazz Reporting Service 6.0 Lifecycle Query Engine (LQE) in IBM Jazz Reporting Service (JRS) 6.0 before 6.0.0-Rational-CLM-ifix005 allows remote authenticated users to conduct LDAP injection attacks, and consequently bypass intended query restrictions or modify the LDAP directory, via unspecified vectors. | 3.1 |
2016-01-08 | CVE-2016-1500 | Owncloud | Information Exposure vulnerability in Owncloud ownCloud Server before 7.0.12, 8.0.x before 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2, when the "file_versions" application is enabled, does not properly check the return value of getOwner, which allows remote authenticated users to read the files with names starting with ".v" and belonging to a sharing user by leveraging an incoming share. | 3.1 |
2016-01-08 | CVE-2015-8481 | Atlassian | Information Exposure vulnerability in Atlassian Jira Core, Jira Server and Jira Service Desk Atlassian JIRA Software 7.0.3, JIRA Core 7.0.3, and the bundled JIRA Service Desk 3.0.3 installer attaches the wrong image to e-mail notifications when a user views an issue with inline wiki markup referencing an image attachment, which might allow remote attackers to obtain sensitive information by updating a different issue that includes wiki markup for an external image reference. | 3.1 |
2016-01-06 | CVE-2015-6641 | Information Exposure vulnerability in Google Android 6.0 Bluetooth in Android 6.0 before 2016-01-01 allows remote attackers to obtain sensitive Contacts information by leveraging pairing, aka internal bug 23607427. | 3.1 |