CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities (CVSS score between 6 and 6.99)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
7451 CVE-2016-6211 264 +Priv 2016-09-09 2016-11-28
6.5
None Remote Low Single system Partial Partial Partial
The User module in Drupal 7.x before 7.44 allows remote authenticated users to gain privileges via vectors involving contributed or custom code that triggers a rebuild of the user profile form.
7452 CVE-2016-6188 399 DoS 2017-02-03 2017-02-07
6.8
None Remote Low Single system None None Complete
Memory leak in SOGo 2.3.7 allows remote attackers to cause a denial of service (memory consumption) via a large number of attempts to upload a large attachment, related to temporary files.
7453 CVE-2016-6184 284 DoS +Priv 2016-09-07 2016-09-08
6.9
None Local Medium Not required Complete Complete Complete
The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6180, CVE-2016-6181, CVE-2016-6182, and CVE-2016-6183.
7454 CVE-2016-6183 284 DoS +Priv 2016-09-07 2016-09-08
6.9
None Local Medium Not required Complete Complete Complete
The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6180, CVE-2016-6181, CVE-2016-6182, and CVE-2016-6184.
7455 CVE-2016-6181 284 DoS +Priv 2016-09-07 2016-09-08
6.9
None Local Medium Not required Complete Complete Complete
The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6180, CVE-2016-6182, CVE-2016-6183, and CVE-2016-6184.
7456 CVE-2016-6180 284 DoS +Priv 2016-09-07 2016-09-08
6.9
None Local Medium Not required Complete Complete Complete
The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6181, CVE-2016-6182, CVE-2016-6183, and CVE-2016-6184.
7457 CVE-2016-6179 284 DoS +Priv 2016-09-07 2019-05-30
6.9
None Local Medium Not required Complete Complete Complete
The WiFi driver in Huawei Honor 6 smartphones with software H60-L01 before H60-L01C00B850, H60-L11 before H60-L11C00B850, H60-L21 before H60-L21C00B850, H60-L02 before H60-L02C00B850, H60-L12 before H60-L12C00B850, and H60-L03 before H60-L03C01B850 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application.
7458 CVE-2016-6174 Exec Code 2016-07-12 2017-03-20
6.8
None Remote Medium Not required Partial Partial Partial
applications/core/modules/front/system/content.php in Invision Power Services IPS Community Suite (aka Invision Power Board, IPB, or Power Board) before 4.1.13, when used with PHP before 5.4.24 or 5.5.x before 5.5.8, allows remote attackers to execute arbitrary code via the content_class parameter.
7459 CVE-2016-6169 119 DoS Exec Code Overflow Mem. Corr. 2018-02-07 2018-02-24
6.8
None Remote Medium Not required Partial Partial Partial
Heap-based buffer overflow in Foxit Reader and PhantomPDF 7.3.4.311 and earlier on Windows allows remote attackers to cause a denial of service (memory corruption and application crash) or potentially execute arbitrary code via the Bezier data in a crafted PDF file.
7460 CVE-2016-6168 416 DoS Exec Code 2018-02-07 2018-02-24
6.8
None Remote Medium Not required Partial Partial Partial
Use-after-free vulnerability in Foxit Reader and PhantomPDF 7.3.4.311 and earlier on Windows allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a crafted PDF file.
7461 CVE-2016-6159 287 Bypass 2016-09-21 2016-09-22
6.8
None Local Network High Not required Complete Complete Complete
The management interface of Huawei WS331a routers with software before WS331a-10 V100R001C01B112 allows remote attackers to bypass authentication and obtain administrative access by sending "special packages" to the LAN interface.
7462 CVE-2016-6124 434 Exec Code 2017-02-01 2017-02-07
6.5
None Remote Low Single system Partial Partial Partial
IBM Kenexa LMS on Cloud 13.1 and 13.2 - 13.2.4 could allow a remote attacker to upload arbitrary files, which could allow the attacker to execute arbitrary code on the vulnerable server.
7463 CVE-2016-6112 264 +Priv 2017-05-22 2017-05-30
6.5
None Remote Low Single system Partial Partial Partial
IBM Distributed Marketing and Marketing Platform 8.6, 9.0, 9.1, and 10.0 could allow an authenticated user to escalate their privileges and gain administrative permissions over the web application. IBM X-Force ID: 118282.
7464 CVE-2016-6105 284 2017-02-01 2017-02-10
6.4
None Remote Low Not required Partial Partial None
IBM Tivoli Key Lifecycle Manager 2.5 and 2.6 do not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas.
7465 CVE-2016-6104 434 Exec Code 2017-02-07 2017-02-13
6.5
None Remote Low Single system Partial Partial Partial
IBM Tivoli Key Lifecycle Manager 2.5, and 2.6 could allow a remote attacker to upload arbitrary files, caused by the improper validation of file extensions, which could allow the attacker to execute arbitrary code on the vulnerable system.
7466 CVE-2016-6103 352 CSRF 2017-02-02 2017-02-07
6.8
None Remote Medium Not required Partial Partial Partial
IBM Tivoli Key Lifecycle Manager 2.5 and 2.6 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
7467 CVE-2016-6100 352 CSRF 2017-04-05 2017-04-12
6.8
None Remote Medium Not required Partial Partial Partial
IBM Disposal and Governance Management for IT and IBM Global Retention Policy and Schedule Management, components of IBM Atlas Policy Suite 6.0.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM Reference #: 2000771.
7468 CVE-2016-6077 284 Exec Code 2017-02-15 2017-02-17
6.8
None Remote Medium Not required Partial Partial Partial
IBM Cognos Disclosure Management 10.2 could allow a malicious attacker to execute commands as a lower privileged user that opens a malicious document. IBM Reference #: 1991584.
7469 CVE-2016-6045 352 CSRF 2017-02-01 2017-02-09
6.8
None Remote Medium Not required Partial Partial Partial
IBM Tivoli Storage Manager Operations Center is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
7470 CVE-2016-6040 384 2017-02-01 2017-02-08
6.0
None Remote Medium Single system Partial Partial Partial
IBM Jazz Foundation could allow an authenticated user to take over a previously logged in user due to session expiration not being enforced.
7471 CVE-2016-6033 352 CSRF 2017-02-15 2017-11-08
6.8
None Remote Medium Not required Partial Partial Partial
IBM Tivoli Storage Manager for Virtual Environments 7.1 (VMware) is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM Reference #: 1995545.
7472 CVE-2016-5995 264 +Priv 2016-09-30 2017-07-29
6.9
None Local Medium Not required Complete Complete Complete
Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program.
7473 CVE-2016-5990 284 2017-02-01 2017-02-07
6.5
None Remote Low Single system Partial Partial Partial
IBM Security Privileged Identity Manager Virtual Appliance allows an authenticated user to upload malicious files that would be automatically executed by the server.
7474 CVE-2016-5983 284 Exec Code 2016-10-05 2016-11-28
6.5
None Remote Low Single system Partial Partial Partial
IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.43, 8.0 before 8.0.0.13, 8.5 before 8.5.5.11, 9.0 before 9.0.0.2, and Liberty before 16.0.0.4 allows remote authenticated users to execute arbitrary Java code via a crafted serialized object.
7475 CVE-2016-5963 284 Exec Code 2016-09-26 2016-11-28
6.5
None Remote Low Single system Partial Partial Partial
IBM Security Privileged Identity Manager (ISPIM) Virtual Appliance 2.x before 2.0.2 FP8 does not properly validate updates, which allows remote authenticated users to execute arbitrary code via unspecified vectors.
7476 CVE-2016-5952 89 Sql 2017-02-01 2017-02-08
6.5
None Remote Low Single system Partial Partial Partial
IBM Kenexa LCMS Premier on Cloud is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.
7477 CVE-2016-5939 89 Sql 2017-02-01 2017-06-08
6.5
None Remote Low Single system Partial Partial Partial
IBM Kenexa LMS on Cloud is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.
7478 CVE-2016-5937 352 CSRF 2017-02-01 2017-02-08
6.8
None Remote Medium Not required Partial Partial Partial
IBM Kenexa LCMS Premier on Cloud is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
7479 CVE-2016-5934 264 Exec Code 2017-02-08 2017-02-15
6.9
None Local Medium Not required Complete Complete Complete
IBM Tivoli Storage Manager FastBack installer could allow a remote attacker to execute arbitrary code on the system. By placing a specially-crafted DLL in the victim's path, an attacker could exploit this vulnerability when the installer is executed to run arbitrary code on the system with privileges of the victim.
7480 CVE-2016-5889 352 CSRF 2017-05-10 2017-05-15
6.8
None Remote Medium Not required Partial Partial Partial
IBM Interact 8.6, 9.0, 9.1, and 10.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 115085.
7481 CVE-2016-5857 264 Exec Code 2017-03-20 2017-05-10
6.9
None Local Medium Not required Complete Complete Complete
The Qualcomm SPCom driver in Android before 7.0 allows local users to execute arbitrary code within the context of the kernel via a crafted application, aka Android internal bug 34386529 and Qualcomm internal bug CR#1094140.
7482 CVE-2016-5851 611 2016-12-21 2016-12-22
6.8
None Remote Medium Not required Partial Partial Partial
python-docx before 0.8.6 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted document.
7483 CVE-2016-5809 352 CSRF 2017-02-13 2018-05-19
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX series, ION76XX series, ION8650 series, ION8800 series, and PM5XXX series. There is no CSRF Token generated to authenticate the user during a session. Successful exploitation of this vulnerability can allow unauthorized configuration changes to be made and saved.
7484 CVE-2016-5805 119 DoS Exec Code Overflow 2017-02-13 2017-03-14
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to2.10.10. There are multiple instances of heap-based buffer overflows that may allow malicious files to cause the execution of arbitrary code or a denial of service.
7485 CVE-2016-5802 787 2017-02-13 2017-03-14
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to 2.10.10. Multiple instances of out-of-bounds write conditions may allow malicious files to be read and executed by the affected software.
7486 CVE-2016-5796 119 Exec Code Overflow 2017-02-13 2017-02-17
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in Fatek Automation PM Designer V3 Version 2.1.2.2, and Automation FV Designer Version 1.2.8.0. Sending additional valid packets could allow the attacker to cause a crash or to execute arbitrary code, because of Improper Restriction of Operations within the Bounds of a Memory Buffer.
7487 CVE-2016-5789 352 CSRF 2017-10-12 2017-11-03
6.0
None Remote Medium Single system Partial Partial Partial
A Cross-site Request Forgery issue was discovered in JanTek JTC-200, all versions. An attacker could perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request.
7488 CVE-2016-5781 119 Exec Code Overflow 2016-07-11 2016-11-28
6.8
None Remote Medium Not required Partial Partial Partial
Stack-based buffer overflow in WECON LeviStudio allows remote attackers to execute arbitrary code via a crafted file.
7489 CVE-2016-5767 190 DoS Overflow 2016-08-07 2018-01-04
6.8
None Remote Medium Not required Partial Partial Partial
Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
7490 CVE-2016-5766 190 DoS Overflow 2016-08-07 2019-04-22
6.8
None Remote Medium Not required Partial Partial Partial
Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.
7491 CVE-2016-5764 119 Exec Code Overflow 2016-10-27 2017-09-02
6.8
None Remote Medium Not required Partial Partial Partial
Micro Focus Rumba FTP 4.X client buffer overflow makes it possible to corrupt the stack and allow arbitrary code execution. Fixed in: Rumba FTP 4.5 (HF 14668). This can only occur if a client connects to a malicious server.
7492 CVE-2016-5763 254 2016-11-15 2016-11-28
6.4
None Remote Low Not required Partial Partial None
Vulnerability in Novell Open Enterprise Server (OES2015 SP1 before Scheduled Maintenance Update 10992, OES2015 before Scheduled Maintenance Update 10990, OES11 SP3 before Scheduled Maintenance Update 10991, OES11 SP2 before Scheduled Maintenance Update 10989) might allow authenticated remote attackers to perform unauthorized file access and modification.
7493 CVE-2016-5759 20 2017-09-08 2018-10-30
6.9
None Local Medium Not required Complete Complete Complete
The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
7494 CVE-2016-5758 352 CSRF 2017-03-23 2019-04-23
6.8
None Remote Medium Not required Partial Partial Partial
A cross site request forgery protection mechanism in NetIQ Access Manager 4.1 before 4.1.2 Hot Fix 1 and 4.2 before 4.2.2 could be circumvented by repeated uploads causing a high load.
7495 CVE-2016-5750 284 Exec Code 2017-03-23 2017-03-24
6.5
None Remote Low Single system Partial Partial Partial
The certificate upload feature in iManager in NetIQ Access Manager 4.1 before 4.1.2 Hot Fix 1 and 4.2 before 4.2.2 could be used to upload JSP pages that would be executed as the iManager user, allowing code execution by logged-in remote users.
7496 CVE-2016-5735 190 Overflow 2017-05-23 2017-05-31
6.8
None Remote Medium Not required Partial Partial Partial
Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
7497 CVE-2016-5729 264 Exec Code 2016-06-30 2019-09-27
6.8
None Local Low Single system Complete Complete Complete
Lenovo BIOS EFI Driver allows local administrators to execute arbitrary code with System Management Mode (SMM) privileges via unspecified vectors.
7498 CVE-2016-5727 94 Exec Code 2017-02-09 2017-02-23
6.8
None Remote Medium Not required Partial Partial Partial
LogInOut.php in Simple Machines Forum (SMF) 2.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via vectors related to variables derived from user input in a foreach loop.
7499 CVE-2016-5716 134 Exec Code 2017-08-09 2019-07-10
6.5
None Remote Low Single system Partial Partial Partial
The console in Puppet Enterprise 2015.x and 2016.x prior to 2016.4.0 includes unsafe string reads that potentially allows for remote code execution on the console node.
7500 CVE-2016-5714 284 Exec Code Bypass 2017-10-18 2019-07-10
6.5
None Remote Low Single system Partial Partial Partial
Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.