Vulnerabilities (CVE)

Filtered by CWE-284
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-5587 1 Oracle 1 Customer Interaction History 2017-07-29 6.4 MEDIUM 8.2 HIGH
Unspecified vulnerability in the Oracle Customer Interaction History component in Oracle E-Business Suite 12.1.1 through 12.1.3, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2016-5591 and CVE-2016-5593.
CVE-2016-5588 1 Oracle 1 Outside In Technology 2017-07-29 7.5 HIGH 8.6 HIGH
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 and 8.5.1 through 8.5.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-5558, CVE-2016-5574, CVE-2016-5577, CVE-2016-5578, and CVE-2016-5579.
CVE-2016-5562 1 Oracle 1 Iprocurement 2017-07-29 4.9 MEDIUM 7.6 HIGH
Unspecified vulnerability in the Oracle iProcurement component in Oracle E-Business Suite 12.1.1 through 12.1.3 and 12.2.3 through 12.2.6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
CVE-2016-5589 1 Oracle 1 Customer Relationship Management Technical Foundation 2017-07-29 6.4 MEDIUM 8.2 HIGH
Unspecified vulnerability in the Oracle CRM Technical Foundation component in Oracle E-Business Suite 12.1.1 through 12.1.3 and 12.2.3 through 12.2.6 allows remote attackers to affect confidentiality and integrity via unknown vectors.
CVE-2016-5577 1 Oracle 1 Outside In Technology 2017-07-29 7.5 HIGH 8.6 HIGH
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 and 8.5.1 through 8.5.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-5558, CVE-2016-5574, CVE-2016-5578, CVE-2016-5579, and CVE-2016-5588.
CVE-2016-5578 1 Oracle 1 Outside In Technology 2017-07-29 7.5 HIGH 8.6 HIGH
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 and 8.5.1 through 8.5.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-5558, CVE-2016-5574, CVE-2016-5577, CVE-2016-5579, and CVE-2016-5588.
CVE-2016-5586 1 Oracle 1 Email Center 2017-07-29 6.4 MEDIUM 8.2 HIGH
Unspecified vulnerability in the Oracle Email Center component in Oracle E-Business Suite 12.1.1 through 12.1.3 and 12.2.3 through 12.2.6 allows remote attackers to affect confidentiality and integrity via unknown vectors.
CVE-2016-5593 1 Oracle 1 Customer Interaction History 2017-07-29 6.4 MEDIUM 8.2 HIGH
Unspecified vulnerability in the Oracle Customer Interaction History component in Oracle E-Business Suite 12.1.1 through 12.1.3, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2016-5587 and CVE-2016-5591.
CVE-2016-5595 1 Oracle 1 Customer Interaction History 2017-07-29 6.4 MEDIUM 8.2 HIGH
Unspecified vulnerability in the Oracle Customer Interaction History component in Oracle E-Business Suite 12.1.1 through 12.1.3, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2016-5592.
CVE-2016-5607 1 Oracle 1 Flexcube Universal Banking 2017-07-29 6.5 MEDIUM 8.8 HIGH
Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Applications 11.3.0, 11.4.0, 12.0.1 through 12.0.3, 12.1.0, and 12.2.0 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to INFRA.
CVE-2016-5619 1 Oracle 1 Flexcube Universal Banking 2017-07-29 5.5 MEDIUM 8.1 HIGH
Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Applications 11.3.0, 11.4.0, 12.0.1 through 12.0.3, 12.1.0, and 12.2.0 allows remote authenticated users to affect confidentiality and integrity via vectors related to INFRA, a different vulnerability than CVE-2016-5620.
CVE-2016-8032 1 Mcafee 1 Anti-malware Scan Engine 2017-07-12 4.4 MEDIUM 7.3 HIGH
Software Integrity Attacks vulnerability in Intel Security Anti-Virus Engine (AVE) 5200 through 5800 allows local attackers to bypass local security protection via a crafted input file.
CVE-2016-10237 1 Google 1 Android 2017-07-11 9.3 HIGH 7.8 HIGH
If shared content protection memory were passed as the secure camera memory buffer by the HLOS to a trusted application (TA) in all Android releases from CAF using the Linux kernel, the TA would not detect an issue and it would be treated as secure memory.
CVE-2014-9961 1 Google 1 Android 2017-07-08 9.3 HIGH 7.8 HIGH
In all Android releases from CAF using the Linux kernel, a vulnerability in eMMC write protection exists that can be used to bypass power-on write protection.
CVE-2015-9029 1 Google 1 Android 2017-07-08 9.3 HIGH 7.8 HIGH
In all Android releases from CAF using the Linux kernel, a vulnerability exists in the access control settings of modem memory.
CVE-2016-10042 1 Arcadyan 2 Swisscom Internet-box, Swisscom Internet-box Firmware 2017-07-07 5.0 MEDIUM 7.5 HIGH
Authorization Bypass in the Web interface of Arcadyan SLT-00 Star* (aka Swisscom Internet-Box) devices before R7.7 allows unauthorized reconfiguration of the static routing table via an unauthenticated HTTP request, leading to denial of service and information disclosure.
CVE-2016-4383 1 Hp 1 Helion Openstack Glance 2017-07-06 8.5 HIGH 8.4 HIGH
The glance-manage db in all versions of HPE Helion Openstack Glance allows deleted image ids to be reassigned, which allows remote authenticated users to cause other users to boot into a modified image without notification of the change.
CVE-2016-5414 1 Freeipa 1 Freeipa 2017-07-05 5.0 MEDIUM 7.5 HIGH
FreeIPA 4.4.0 allows remote attackers to request an arbitrary SAN name for services.
CVE-2016-7946 2 Fedoraproject, X.org 2 Fedora, Libxi 2017-07-01 5.0 MEDIUM 7.5 HIGH
X.org libXi before 1.7.7 allows remote X servers to cause a denial of service (infinite loop) via vectors involving length fields.
CVE-2016-9920 1 Roundcube 1 Webmail 2017-07-01 6.0 MEDIUM 7.5 HIGH
steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2.3, when no SMTP server is configured and the sendmail program is enabled, does not properly restrict the use of custom envelope-from addresses on the sendmail command line, which allows remote authenticated users to execute arbitrary code via a modified HTTP request that sends a crafted e-mail message.
CVE-2016-9190 2 Debian, Python 2 Debian Linux, Pillow 2017-07-01 6.8 MEDIUM 7.8 HIGH
Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
CVE-2016-3105 2 Debian, Mercurial 2 Debian Linux, Mercurial 2017-07-01 6.8 MEDIUM 8.8 HIGH
The convert extension in Mercurial before 3.8 might allow context-dependent attackers to execute arbitrary code via a crafted git repository name.
CVE-2016-6258 2 Citrix, Xen 2 Xenserver, Xen 2017-07-01 7.2 HIGH 8.8 HIGH
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
CVE-2016-5801 1 Omnimetrix 1 Omniview 2017-06-28 5.0 MEDIUM 7.5 HIGH
An issue was discovered in OmniMetrix OmniView, Version 1.2. Insufficient password requirements for the OmniView web application may allow an attacker to gain access by brute forcing account passwords.
CVE-2016-7811 1 Corega 2 Cg-wlr300nx, Cg-wlr300nx Firmware 2017-06-16 5.8 MEDIUM 8.8 HIGH
Corega CG-WLR300NX firmware Ver. 1.20 and earlier allows an attacker on the same network segment to bypass access restriction to perform arbitrary operations via unspecified vectors.
CVE-2016-7807 1 Iodata 2 Wfs-sr01, Wfs-sr01 Firmware 2017-06-15 5.0 MEDIUM 7.5 HIGH
I-O DATA DEVICE WFS-SR01 firmware version 1.10 and earlier allow remote attackers to bypass access restriction to access data on storage devices inserted into the product via unspecified vectors.
CVE-2016-7824 1 Buffalotech 2 Wnc01wh, Wnc01wh Firmware 2017-06-15 6.5 MEDIUM 8.8 HIGH
Buffalo NC01WH devices with firmware version 1.0.0.8 and earlier allows authenticated attackers to bypass access restriction to enable the debug option via unspecified vectors.
CVE-2016-7833 1 Cybozu 1 Dezie 2017-06-14 6.4 MEDIUM 7.5 HIGH
Cybozu Dezie 8.0.0 to 8.1.1 allows remote attackers to bypass access restrictions to delete an arbitrary DBM (Cybozu Dezie proprietary format) file via unspecified vectors.
CVE-2016-6098 1 Ibm 2 Security Key Lifecycle Manager, Tivoli Key Lifecycle Manager 2017-06-13 5.5 MEDIUM 8.1 HIGH
IBM Tivoli Key Lifecycle Manager 2.0.1, 2.5, and 2.6 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
CVE-2016-0768 1 Postgresql 1 Postgresql 2017-06-13 5.0 MEDIUM 7.5 HIGH
PostgreSQL PL/Java after 9.0 does not honor access controls on large objects.
CVE-2016-9156 1 Siemens 1 Sicam Pas 2017-06-13 7.5 HIGH 7.3 HIGH
A vulnerability in Siemens SICAM PAS (all versions before V8.09) could allow a remote attacker to upload, download, or delete files in certain parts of the file system by sending specially crafted packets to port 19235/TCP.
CVE-2015-9006 1 Google 1 Android 2017-06-09 9.3 HIGH 7.8 HIGH
In Resource Power Manager (RPM) in all Android releases from CAF using the Linux kernel, an Improper Access Control vulnerability could potentially exist.
CVE-2016-9016 1 Firejail Project 1 Firejail 2017-06-08 7.2 HIGH 8.8 HIGH
Firejail 0.9.38.4 allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
CVE-2016-8587 1 Trendmicro 1 Threat Discovery Appliance 2017-05-25 6.0 MEDIUM 7.3 HIGH
dlp_policy_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via an archive file containing a symlink to /eng_ptn_stores/prod/sensorSDK/data/ or /eng_ptn_stores/prod/sensorSDK/backup_pol/.
CVE-2016-10370 1 Oneplus 2 Oneplus 3t, Oxygenos 2017-05-23 5.0 MEDIUM 7.5 HIGH
An issue was discovered on OnePlus devices such as the 3T. The OnePlus OTA Updater pushes the signed-OTA image over HTTP without TLS. While it does not allow for installation of arbitrary OTAs (due to the digital signature), it unnecessarily increases the attack surface, and allows for remote exploitation of other vulnerabilities such as CVE-2017-5948, CVE-2017-8850, and CVE-2017-8851.
CVE-2016-10369 1 Lxterminal Project 1 Lxterminal 2017-05-16 4.6 MEDIUM 7.8 HIGH
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).
CVE-2016-9976 1 Ibm 2 Maximo Asset Management, Maximo Asset Management Essentials 2017-05-12 6.8 MEDIUM 8.4 HIGH
IBM Maximo Asset Management 7.1, 7.5, and 7.6 could allow a remote attacker to include arbitrary files. A remote attacker could send a specially-crafted URL request, which could allow the attacker to execute arbitrary code on the vulnerable server. IBM X-Force ID: 120252.
CVE-2016-2930 1 Ibm 1 Bigfix Remote Control 2017-05-12 5.0 MEDIUM 7.5 HIGH
IBM BigFix Remote Control 9.1.3 could allow a remote attacker to perform actions reserved for an administrator without authentication. IBM X-Force ID: 5512.
CVE-2016-8588 1 Trendmicro 1 Threat Discovery Appliance 2017-05-10 6.0 MEDIUM 7.3 HIGH
The hotfix_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via shell metacharacters in the file name of an uploaded file.
CVE-2016-2433 1 Google 1 Android 2017-05-02 8.3 HIGH 8.8 HIGH
The Broadcom Wi-Fi driver for Android, as used by BlackBerry smartphones before Build AAE570, allows remote attackers to execute arbitrary code in the context of the kernel.
CVE-2015-0104 1 Ibm 11 Change And Configuration Management Database, Maximo Asset Management, Maximo Asset Management Essentials and 8 more 2017-04-27 6.5 MEDIUM 8.8 HIGH
IBM Tivoli IT Asset Management for IT, Tivoli Service Request Manager, and Change and Configuration Management Database 7.1 through 7.1.1.8 and 7.2 and Maximo Asset Management and Maximo Industry Solutions 7.1 through 7.1.1.8, 7.5 before 7.5.0.7 IFIX003, and 7.6 before 7.6.0.0 IFIX002 allow remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2016-4850 1 Linecorp 1 Line 2017-04-26 6.8 MEDIUM 8.1 HIGH
LINE for Windows before 4.8.3 allows man-in-the-middle attackers to execute arbitrary code.
CVE-2016-6331 1 Mediawiki 1 Mediawiki 2017-04-24 5.0 MEDIUM 7.5 HIGH
ApiParse in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to bypass intended per-title read restrictions via a parse action to api.php.
CVE-2016-6337 1 Mediawiki 1 Mediawiki 2017-04-24 5.0 MEDIUM 7.5 HIGH
MediaWiki 1.27.x before 1.27.1 might allow remote attackers to bypass intended session access restrictions by leveraging a call to the UserGetRights function after Session::getAllowedUserRights.
CVE-2015-8284 1 Seawell Networks 1 Spectrum Sdc 2017-04-19 6.5 MEDIUM 8.8 HIGH
SeaWell Networks Spectrum SDC 02.05.00 allows remote viewer users to perform administrative functions.
CVE-2016-6605 1 Cloudera 1 Cdh 2017-04-14 5.0 MEDIUM 7.5 HIGH
Impala in CDH 5.2.0 through 5.7.2 and 5.8.0 allows remote attackers to bypass Setry authorization.
CVE-2016-5058 1 Osram 1 Lightify Pro 2017-04-14 5.0 MEDIUM 7.5 HIGH
OSRAM SYLVANIA Osram Lightify Pro through 2016-07-26 allows Zigbee replay.
CVE-2016-5054 1 Osram 1 Lightify Home 2017-04-14 5.0 MEDIUM 7.5 HIGH
OSRAM SYLVANIA Osram Lightify Home through 2016-07-26 allows Zigbee replay.
CVE-2014-3930 1 Lg Project 1 Lg 2017-04-11 5.0 MEDIUM 7.5 HIGH
lg.pl in Cistron-LG 1.01 stores sensitive information under the web root with insufficient access controls, which allows remote attackers to obtain IP addresses and other unspecified router credentials.
CVE-2014-3929 1 Lg Project 1 Lg 2017-04-11 5.0 MEDIUM 7.5 HIGH
The default configuration for Cougar-LG stores sensitive information under the web root with insufficient access control, which might allow remote attackers to obtain private ssh keys.