# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
4551 |
CVE-2016-10288 |
264 |
|
Exec Code |
2017-05-12 |
2017-05-19 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm LED driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-33863909. References: QC-CR#1109763. |
4552 |
CVE-2016-10287 |
264 |
|
Exec Code |
2017-05-12 |
2017-05-19 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-33784446. References: QC-CR#1112751. |
4553 |
CVE-2016-10286 |
264 |
|
Exec Code |
2017-05-12 |
2017-05-19 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-35400904. References: QC-CR#1090237. |
4554 |
CVE-2016-10285 |
264 |
|
Exec Code |
2017-05-12 |
2017-05-19 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-33752702. References: QC-CR#1104899. |
4555 |
CVE-2016-10284 |
264 |
|
Exec Code |
2017-05-12 |
2017-05-19 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32402303. References: QC-CR#2000664. |
4556 |
CVE-2016-10283 |
264 |
|
Exec Code |
2017-05-12 |
2017-05-23 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32094986. References: QC-CR#2002052. |
4557 |
CVE-2016-10282 |
264 |
|
Exec Code |
2017-05-12 |
2017-05-24 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the MediaTek thermal driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-33939045. References: M-ALPS03149189. |
4558 |
CVE-2016-10281 |
264 |
|
Exec Code |
2017-05-12 |
2017-05-24 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the MediaTek thermal driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-28175647. References: M-ALPS02696475. |
4559 |
CVE-2016-10280 |
264 |
|
Exec Code |
2017-05-12 |
2017-05-24 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the MediaTek thermal driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-28175767. References: M-ALPS02696445. |
4560 |
CVE-2016-10253 |
119 |
|
Overflow |
2017-03-18 |
2018-07-11 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to. |
4561 |
CVE-2016-10252 |
399 |
|
|
2017-03-14 |
2017-11-03 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
Memory leak in the IsOptionMember function in MagickCore/option.c in ImageMagick before 6.9.2-2, as used in ODR-PadEnc and other products, allows attackers to trigger memory consumption. |
4562 |
CVE-2016-10243 |
20 |
|
Exec Code |
2017-05-02 |
2017-09-18 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
TeX Live allows remote attackers to execute arbitrary commands by leveraging inclusion of mpost in shell_escape_commands in the texmf.cnf config file. |
4563 |
CVE-2016-10242 |
362 |
|
|
2017-05-16 |
2017-07-10 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
A time-of-check time-of-use race condition could potentially exist in the secure file system in all Android releases from CAF using the Linux kernel. |
4564 |
CVE-2016-10227 |
399 |
|
DoS |
2017-02-21 |
2017-03-28 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
Zyxel USG50 Security Appliance and NWA3560-N Access Point allow remote attackers to cause a denial of service (CPU consumption) via a flood of ICMPv4 Port Unreachable packets. |
4565 |
CVE-2016-10225 |
264 |
|
+Priv |
2017-03-27 |
2017-03-31 |
7.2 |
Admin |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The sunxi-debug driver in Allwinner 3.4 legacy kernel for H3, A83T and H8 devices allows local users to gain root privileges by sending "rootmydevice" to /proc/sunxi_debug/sunxi_debug. |
4566 |
CVE-2016-10205 |
384 |
|
|
2017-03-03 |
2017-03-28 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Session fixation vulnerability in Zoneminder 1.30 and earlier allows remote attackers to hijack web sessions via the ZMSESSID cookie. |
4567 |
CVE-2016-10204 |
89 |
|
Exec Code Sql |
2017-03-03 |
2017-03-07 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
SQL injection vulnerability in Zoneminder 1.30 and earlier allows remote attackers to execute arbitrary SQL commands via the limit parameter in a log query request to index.php. |
4568 |
CVE-2016-10195 |
125 |
|
|
2017-03-15 |
2018-01-04 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read. |
4569 |
CVE-2016-10194 |
77 |
|
Exec Code |
2017-03-03 |
2017-03-09 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) to_speech or (2) to_mp3 method in lib/festivaltts4r/festival4r.rb. |
4570 |
CVE-2016-10193 |
284 |
|
Exec Code |
2017-03-03 |
2017-03-08 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb. |
4571 |
CVE-2016-10192 |
119 |
|
Exec Code Overflow |
2017-02-09 |
2017-02-24 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size. |
4572 |
CVE-2016-10191 |
119 |
|
Exec Code Overflow |
2017-02-09 |
2018-12-21 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches. |
4573 |
CVE-2016-10190 |
119 |
|
Exec Code Overflow |
2017-02-09 |
2018-12-21 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote web servers to execute arbitrary code via a negative chunk size in an HTTP response. |
4574 |
CVE-2016-10188 |
416 |
|
DoS Exec Code |
2017-03-14 |
2017-11-03 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Use-after-free vulnerability in bitlbee-libpurple before 3.5 allows remote servers to cause a denial of service (crash) or possibly execute arbitrary code by causing a file transfer connection to expire. |
4575 |
CVE-2016-10176 |
20 |
|
Exec Code |
2017-01-29 |
2017-09-02 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The NETGEAR WNR2000v5 router allows an administrator to perform sensitive actions by invoking the apply.cgi URL on the web server of the device. This special URL is handled by the embedded web server (uhttpd) and processed accordingly. The web server also contains another URL, apply_noauth.cgi, that allows an unauthenticated user to perform sensitive actions on the device. This functionality can be exploited to change the router settings (such as the answers to the password-recovery questions) and achieve remote code execution. |
4576 |
CVE-2016-10166 |
191 |
|
|
2017-03-15 |
2017-11-03 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable. |
4577 |
CVE-2016-10164 |
787 |
|
DoS Exec Code Overflow |
2017-02-01 |
2018-01-04 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow. |
4578 |
CVE-2016-10160 |
119 |
|
DoS Exec Code Overflow Mem. Corr. |
2017-01-24 |
2018-05-03 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch. |
4579 |
CVE-2016-10157 |
94 |
|
|
2017-01-23 |
2017-02-06 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Akamai NetSession 1.9.3.1 is vulnerable to DLL Hijacking: it tries to load CSUNSAPI.dll without supplying the complete path. The issue is aggravated because the mentioned DLL is missing from the installation, thus making it possible to hijack the DLL and subsequently inject code within the Akamai NetSession process space. |
4580 |
CVE-2016-10156 |
264 |
|
|
2017-01-23 |
2017-07-25 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229. |
4581 |
CVE-2016-10153 |
399 |
|
DoS Mem. Corr. |
2017-02-06 |
2017-02-09 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The crypto scatterlist API in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging reliance on earlier net/ceph/crypto.c code. |
4582 |
CVE-2016-10146 |
399 |
|
DoS |
2017-03-24 |
2017-11-03 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
Multiple memory leaks in the caption and label handling code in ImageMagick allow remote attackers to cause a denial of service (memory consumption) via unspecified vectors. |
4583 |
CVE-2016-10145 |
189 |
|
|
2017-03-24 |
2017-11-03 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Off-by-one error in coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via vectors related to a string copy. |
4584 |
CVE-2016-10144 |
284 |
|
|
2017-03-24 |
2017-11-03 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check. |
4585 |
CVE-2016-10141 |
190 |
|
DoS Exec Code Overflow |
2017-01-13 |
2017-02-01 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition. |
4586 |
CVE-2016-10139 |
310 |
|
|
2017-01-13 |
2017-03-15 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
An issue was discovered on BLU R1 HD devices with Shanghai Adups software. The two package names involved in the exfiltration are com.adups.fota and com.adups.fota.sysoper. In the com.adups.fota.sysoper app's AndroidManifest.xml file, it sets the android:sharedUserId attribute to a value of android.uid.system which makes it execute as the system user, which is a very privileged user on the device. Therefore, the app executing as the system user has been granted a number of powerful permissions even though they are not present in the com.adups.fota.sysoper app's AndroidManifest.xml file. This app provides the com.adups.fota app access to the user's call log, text messages, and various device identifiers through the com.adups.fota.sysoper.provider.InfoProvider component. The com.adups.fota app uses timestamps when it runs and is eligible to exfiltrate the user's PII every 72 hours. If 72 hours have passed since the value of the timestamp, then the exfiltration will be triggered by the user plugging in the device to charge or when they leave or enter a wireless network. The exfiltration occurs in the background without any user interaction. |
4587 |
CVE-2016-10138 |
310 |
|
Exec Code |
2017-01-13 |
2017-03-15 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
An issue was discovered on BLU Advance 5.0 and BLU R1 HD devices with Shanghai Adups software. The com.adups.fota.sysoper app is installed as a system app and cannot be disabled by the user. In the com.adups.fota.sysoper app's AndroidManifest.xml file, it sets the android:sharedUserId attribute to a value of android.uid.system which makes it execute as the system user, which is a very privileged user on the device. The app has an exported broadcast receiver named com.adups.fota.sysoper.WriteCommandReceiver which any app on the device can interact with. Therefore, any app can send a command embedded in an intent which will be executed by the WriteCommandReceiver component which is executing as the system user. The third-party app, utilizing the WriteCommandReceiver, can perform the following actions: call a phone number, factory reset the device, take pictures of the screen, record the screen in a video, install applications, inject events, obtain the Android log, and others. In addition, the com.adups.fota.sysoper.TaskService component will make a request to a URL of http://rebootv5.adsunflower.com/ps/fetch.do where the commands in the String array with a key of sf in the JSON Object sent back by the server will be executed as the system user. Since the connection is made via HTTP, it is vulnerable to a MITM attack. |
4588 |
CVE-2016-10137 |
310 |
|
|
2017-01-13 |
2017-03-15 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
An issue was discovered on BLU R1 HD devices with Shanghai Adups software. The content provider named com.adups.fota.sysoper.provider.InfoProvider in the app with a package name of com.adups.fota.sysoper allows any app on the device to read, write, and delete files as the system user. In the com.adups.fota.sysoper app's AndroidManifest.xml file, it sets the android:sharedUserId attribute to a value of android.uid.system which makes it execute as the system user, which is a very privileged user on the device. This allows a third-party app to read, write, and delete the user's sent and received text messages and call log. This allows a third-party app to obtain PII from the user without permission to do so. |
4589 |
CVE-2016-10136 |
310 |
|
+Info |
2017-01-13 |
2017-03-15 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
An issue was discovered on BLU R1 HD devices with Shanghai Adups software. The content provider named com.adups.fota.sysoper.provider.InfoProvider in the app with a package name of com.adups.fota.sysoper allows any app on the device to read, write, and delete files as the system user. In the com.adups.fota.sysoper app's AndroidManifest.xml file, it sets the android:sharedUserId attribute to a value of android.uid.system which makes it execute as the system user, which is a very privileged user on the device. This allows a third-party app to read, write, and delete files owned by the system user. The third-party app can modify the /data/system/users/0/settings_secure.xml file to add an app as a notification listener to be able to receive the text of notifications as they are received on the device. This also allows the /data/system/users/0/accounts.db to be read which contains authentication tokens for various accounts on the device. The third-party app can obtain privileged information and also modify files to obtain more privileges on the device. |
4590 |
CVE-2016-10134 |
89 |
|
Exec Code Sql |
2017-02-16 |
2017-11-03 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php. |
4591 |
CVE-2016-10133 |
119 |
|
Overflow |
2017-03-24 |
2017-03-27 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Heap-based buffer overflow in the js_stackoverflow function in jsrun.c in Artifex Software, Inc. MuJS allows attackers to have unspecified impact by leveraging an error when dropping extra arguments to lightweight functions. |
4592 |
CVE-2016-10131 |
74 |
|
Exec Code |
2017-01-12 |
2017-03-15 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
system/libraries/Email.php in CodeIgniter before 3.1.3 allows remote attackers to execute arbitrary code by leveraging control over the email->from field to insert sendmail command-line arguments. |
4593 |
CVE-2016-10128 |
119 |
|
Overflow |
2017-03-24 |
2017-03-27 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet. |
4594 |
CVE-2016-10123 |
264 |
|
+Priv |
2017-04-13 |
2017-04-19 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Firejail allows --chroot when seccomp is not supported, which might allow local users to gain privileges. |
4595 |
CVE-2016-10122 |
264 |
|
+Priv |
2017-04-13 |
2017-04-19 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Firejail does not properly clean environment variables, which allows local users to gain privileges. |
4596 |
CVE-2016-10121 |
264 |
|
+Priv |
2017-04-13 |
2017-04-19 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Firejail uses weak permissions for /dev/shm/firejail and possibly other files, which allows local users to gain privileges. |
4597 |
CVE-2016-10120 |
264 |
|
+Priv |
2017-04-13 |
2017-04-19 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Firejail uses 0777 permissions when mounting (1) /dev, (2) /dev/shm, (3) /var/tmp, or (4) /var/lock, which allows local users to gain privileges. |
4598 |
CVE-2016-10119 |
264 |
|
+Priv |
2017-04-13 |
2017-04-19 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Firejail uses 0777 permissions when mounting /tmp, which allows local users to gain privileges. |
4599 |
CVE-2016-10117 |
264 |
|
+Priv |
2017-04-13 |
2017-04-19 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Firejail does not restrict access to --tmpfs, which allows local users to gain privileges, as demonstrated by mounting over /etc. |
4600 |
CVE-2016-10114 |
89 |
|
Exec Code Sql |
2017-01-03 |
2017-01-10 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
SQL injection vulnerability in the "aWeb Cart Watching System for Virtuemart" extension before 2.6.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via vectors involving categorysearch and smartSearch. |