Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2016-5839 | 1 Wordpress | 1 Wordpress | 2016-11-28 | 5.0 MEDIUM | 7.5 HIGH |
WordPress before 4.5.3 allows remote attackers to bypass the sanitize_file_name protection mechanism via unspecified vectors. | |||||
CVE-2016-5840 | 1 Trend Micro | 1 Deep Discovery Inspector | 2016-11-28 | 9.0 HIGH | 7.2 HIGH |
hotfix_upload.cgi in Trend Micro Deep Discovery Inspector (DDI) 3.7, 3.8 SP1 (3.81), and 3.8 SP2 (3.82) allows remote administrators to execute arbitrary code via shell metacharacters in the filename parameter of the Content-Disposition header. | |||||
CVE-2016-5843 | 1 Otrs | 1 Faq | 2016-11-28 | 9.0 HIGH | 9.4 CRITICAL |
Multiple SQL injection vulnerabilities in the FAQ package 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5 in Open Ticket Request System (OTRS) allow remote attackers to execute arbitrary SQL commands via crafted search parameters. | |||||
CVE-2016-5848 | 1 Siemens | 1 Sicam Pas | 2016-11-28 | 1.7 LOW | 6.7 MEDIUM |
Siemens SICAM PAS before 8.07 does not properly restrict password data in the database, which makes it easier for local users to calculate passwords by leveraging unspecified database privileges. | |||||
CVE-2016-5849 | 1 Siemens | 1 Sicam Pas | 2016-11-28 | 1.9 LOW | 2.5 LOW |
Siemens SICAM PAS through 8.07 allows local users to obtain sensitive configuration information by leveraging database stoppage. | |||||
CVE-2016-5874 | 1 Siemens | 1 Simatic Net Pc-software | 2016-11-28 | 5.0 MEDIUM | 7.5 HIGH |
Siemens SIMATIC NET PC-Software before 13 SP2 allows remote attackers to cause a denial of service (OPC UA service outage) via crafted TCP packets. | |||||
CVE-2016-5878 | 1 Ibm | 1 Filenet Workplace | 2016-11-28 | 4.9 MEDIUM | 6.8 MEDIUM |
Open redirect vulnerability in IBM FileNet Workplace 4.0.2 before 4.0.2.14 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | |||||
CVE-2016-5879 | 1 Ibm | 3 Mq Appliance Firmware, Mq Appliance M2000, Mq Appliance M2001 | 2016-11-28 | 4.6 MEDIUM | 8.8 HIGH |
MQCLI on IBM MQ Appliance M2000 and M2001 devices allows local users to execute arbitrary shell commands via a crafted (1) Disaster Recovery or (2) High Availability command. | |||||
CVE-2016-5645 | 1 Rockwellautomation | 6 1766-l32awa, 1766-l32awaa, 1766-l32bwa and 3 more | 2016-11-28 | 7.5 HIGH | 7.3 HIGH |
Rockwell Automation MicroLogix 1400 PLC 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L32AWAA, and 1766-L32BXBA devices have a hardcoded SNMP community, which makes it easier for remote attackers to load arbitrary firmware updates by leveraging knowledge of this community. | |||||
CVE-2016-5650 | 1 Zmodo | 2 Zp-ibh-13w, Zp-ne-14-s | 2016-11-28 | 5.0 MEDIUM | 7.5 HIGH |
ZModo ZP-NE14-S and ZP-IBH-13W devices do not enforce a WPA2 configuration setting, which allows remote attackers to trigger association with an arbitrary access point by using a recognized SSID value. | |||||
CVE-2016-5653 | 1 Misys | 1 Fusioncapital Opics Plus | 2016-11-28 | 4.0 MEDIUM | 6.5 MEDIUM |
Multiple SQL injection vulnerabilities in Misys FusionCapital Opics Plus allow remote authenticated users to execute arbitrary SQL commands via the (1) ID or (2) Branch parameter. | |||||
CVE-2016-5654 | 1 Misys | 1 Fusioncapital Opics Plus | 2016-11-28 | 8.5 HIGH | 7.5 HIGH |
Misys FusionCapital Opics Plus allows remote authenticated users to gain privileges via a man-in-the-middle attack that modifies the xmlMessageOut parameter. | |||||
CVE-2016-5655 | 1 Misys | 1 Fusioncapital Opics Plus | 2016-11-28 | 4.3 MEDIUM | 5.9 MEDIUM |
Misys FusionCapital Opics Plus does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to obtain sensitive information via a crafted certificate. | |||||
CVE-2016-5661 | 1 Accela | 1 Civic Platform Citizen Access Portal | 2016-11-28 | 6.5 MEDIUM | 8.8 HIGH |
Accela Civic Platform Citizen Access portal relies on the client to restrict file types for uploads, which allows remote authenticated users to execute arbitrary code via modified _EventArgument and filename parameters. | |||||
CVE-2016-5662 | 1 Accellion | 1 Kiteworks Appliance | 2016-11-28 | 7.2 HIGH | 7.8 HIGH |
Accellion Kiteworks appliances before kw2016.03.00 use setuid-root permissions for /opt/bin/cli, which allows local users to gain privileges via unspecified vectors. | |||||
CVE-2016-5663 | 1 Accellion | 1 Kiteworks Appliance | 2016-11-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in oauth_callback.php on Accellion Kiteworks appliances before kw2016.03.00 allow remote attackers to inject arbitrary web script or HTML via the (1) code, (2) error, or (3) error_description parameter. | |||||
CVE-2016-5664 | 1 Accellion | 1 Kiteworks Appliance | 2016-11-28 | 5.0 MEDIUM | 4.3 MEDIUM |
Directory traversal vulnerability on Accellion Kiteworks appliances before kw2016.03.00 allows remote attackers to read files via a crafted URI. | |||||
CVE-2016-5673 | 1 Ultravnc | 1 Repeater | 2016-11-28 | 5.0 MEDIUM | 7.5 HIGH |
UltraVNC Repeater before 1300 does not restrict destination IP addresses or TCP ports, which allows remote attackers to obtain open-proxy functionality by using a :: substring in between the IP address and port number. | |||||
CVE-2016-5681 | 1 D-link | 20 Dir-817l\(w\), Dir-817l\(w\) Firmware, Dir-818l\(w\) and 17 more | 2016-11-28 | 9.3 HIGH | 9.8 CRITICAL |
Stack-based buffer overflow in dws/api/Login on D-Link DIR-850L B1 2.07 before 2.07WWB05, DIR-817 Ax, DIR-818LW Bx before 2.05b03beta03, DIR-822 C1 3.01 before 3.01WWb02, DIR-823 A1 1.00 before 1.00WWb05, DIR-895L A1 1.11 before 1.11WWb04, DIR-890L A1 1.09 before 1.09b14, DIR-885L A1 1.11 before 1.11WWb07, DIR-880L A1 1.07 before 1.07WWb08, DIR-868L B1 2.03 before 2.03WWb01, and DIR-868L C1 3.00 before 3.00WWb01 devices allows remote attackers to execute arbitrary code via a long session cookie. | |||||
CVE-2016-5683 | 1 Readydesk | 1 Readydesk | 2016-11-28 | 4.6 MEDIUM | 7.8 HIGH |
ReadyDesk 9.1 allows local users to determine cleartext SQL Server credentials by reading the SQL_Config.aspx file and decrypting data with a hardcoded key in the ReadyDesk.dll file. |