<!DOCTYPE html>
<html><head>
    <meta charset="UTF-8">
</head><body><p><br></p><blockquote type="cite">---------- Original Message ----------<br>From: US-CERT <US-CERT@ncas.us-cert.gov><br>To: w3hwn@arrl.net<br>Date: January 16, 2017 at 5:23 PM<br>Subject: SB17-016: Vulnerability Summary for the Week of January 9, 2017<br><br><table width="700" border="0" cellspacing="0" cellpadding="0" align="center" style="border-collapse: collapse;" class="mce-item-table"><tbody><tr><td style="padding: 0px;"><p><img src="http://content.govdelivery.com/attachments/fancy_images/USDHSUSCERT/2015/11/675988/us-cert-banner-700x100-2_original.png" alt="U.S. Department of Homeland Security US-CERT" width="700" height="100" style="width: 700px; height: 100px;"></p><p>National Cyber Awareness System:</p><p> </p><div class="ox-9ad8340aa9-rss_item" style="margin-bottom: 2em;"><div class="ox-9ad8340aa9-rss_title" style="font-weight: bold; font-size: 120%; margin: 0 0 0.3em; padding: 0;"><a href="https://www.us-cert.gov/ncas/bulletins/SB17-016">SB17-016: Vulnerability Summary for the Week of January 9, 2017</a></div><div class="ox-9ad8340aa9-rss_pub_date" style="font-size: 90%; font-style: italic; color: #666666; margin: 0 0 0.3em; padding: 0;">01/16/2017 07:01 AM EST</div><br><div class="ox-9ad8340aa9-rss_description" style="margin: 0 0 0.3em; padding: 0;">Original release date: January 16, 2017 <br><p>The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the <a href="http://www.nist.gov">National Institute of Standards and Technology</a> (NIST) <a href="http://nvd.nist.gov">National Vulnerability Database</a> (NVD) in the past week. The NVD is sponsored by the <a href="http://www.dhs.gov">Department of Homeland Security</a> (DHS) <a href="https://www.us-cert.gov/nccic">National Cybersecurity and Communications Integration Center</a> (NCCIC) / <a href="https://www.us-cert.gov">United States Computer Emergency Readiness Team</a> (US-CERT). For modified or updated entries, please visit the <a href="http://nvd.nist.gov" target="_blank">NVD</a>, which contains historical vulnerability information.</p><p>The vulnerabilities are based on the <a href="http://cve.mitre.org/" target="_blank">CVE</a> vulnerability naming standard and are organized according to severity, determined by the <a href="http://nvd.nist.gov/cvss.cfm" target="_blank">Common Vulnerability Scoring System</a> (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:</p><ul><li><p><strong><a href="#high">High</a></strong> - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0</p></li><li><p><strong><a href="#medium">Medium</a></strong> - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9</p></li><li><p><strong><a href="#low">Low</a></strong> - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9</p></li></ul><p>Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.</p><p><a id="ox-9ad8340aa9-high" name="high" class="mce-item-anchor"></a></p><div id="ox-9ad8340aa9-high_v"><h2 id="ox-9ad8340aa9-high_v_title">High Vulnerabilities</h2><table border="1" summary="High Vulnerabilities" align="center"><thead><tr><th class="ox-9ad8340aa9-vendor-product" style="width: 24%;" scope="col">Primary<br>Vendor -- Product</th><th style="width: 44%;" scope="col">Description</th><th style="width: 8%;" scope="col">Published</th><th style="width: 4%;" scope="col">CVSS Score</th><th style="width: 10%;" scope="col">Source & Patch Info</th></tr></thead><tbody><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when processing a malformed cross-reference table. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2939&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2939" target="_blank">CVE-2017-2939</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when processing JPEG 2000 files. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2940&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2940" target="_blank">CVE-2017-2940</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when processing Compact Font Format data. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2941&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2941" target="_blank">CVE-2017-2941</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability when processing TIFF image data. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2942&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2942" target="_blank">CVE-2017-2942</a><br><a href="http://www.securityfocus.com/bid/95344" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when processing tags in TIFF images. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2943&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2943" target="_blank">CVE-2017-2943</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when parsing crafted TIFF image files. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2944&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2944" target="_blank">CVE-2017-2944</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability when parsing TIFF image files. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2945&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2945" target="_blank">CVE-2017-2945</a><br><a href="http://www.securityfocus.com/bid/95344" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability when parsing the segment for storing non-graphic information. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2946&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2946" target="_blank">CVE-2017-2946</a><br><a href="http://www.securityfocus.com/bid/95344" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable buffer overflow / underflow vulnerability in the XFA engine. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2948&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2948" target="_blank">CVE-2017-2948</a><br><a href="http://www.securityfocus.com/bid/95346" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the XSLT engine. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2949&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2949" target="_blank">CVE-2017-2949</a><br><a href="http://www.securityfocus.com/bid/95344" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the XFA engine, related to layout functionality. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2950&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2950" target="_blank">CVE-2017-2950</a><br><a href="http://www.securityfocus.com/bid/95343" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the XFA engine, related to sub-form functionality. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2951&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2951" target="_blank">CVE-2017-2951</a><br><a href="http://www.securityfocus.com/bid/95343" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable buffer overflow / underflow vulnerability in the image conversion module related to parsing tags in TIFF files. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2952&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2952" target="_blank">CVE-2017-2952</a><br><a href="http://www.securityfocus.com/bid/95346" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion module when processing a TIFF image. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2953&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2953" target="_blank">CVE-2017-2953</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion module when handling malformed TIFF images. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2954&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2954" target="_blank">CVE-2017-2954</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2955&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2955" target="_blank">CVE-2017-2955</a><br><a href="http://www.securityfocus.com/bid/95343" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine, related to manipulation of the navigation pane. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2956&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2956" target="_blank">CVE-2017-2956</a><br><a href="http://www.securityfocus.com/bid/95343" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine, related to collaboration functionality. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2957&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2957" target="_blank">CVE-2017-2957</a><br><a href="http://www.securityfocus.com/bid/95343" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2958&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2958" target="_blank">CVE-2017-2958</a><br><a href="http://www.securityfocus.com/bid/95343" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the image conversion engine, related to parsing of color profile metadata. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2959&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2959" target="_blank">CVE-2017-2959</a><br><a href="http://www.securityfocus.com/bid/95344" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to parsing of EXIF metadata. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2960&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2960" target="_blank">CVE-2017-2960</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the XFA engine, related to validation functionality. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2961&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2961" target="_blank">CVE-2017-2961</a><br><a href="http://www.securityfocus.com/bid/95343" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable type confusion vulnerability in the XSLT engine related to localization functionality. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2962&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2962" target="_blank">CVE-2017-2962</a><br><a href="http://www.securityfocus.com/bid/95340" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to handling of the color profile in a TIFF file. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2963&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2963" target="_blank">CVE-2017-2963</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to the parsing of JPEG EXIF metadata. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2964&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2964" target="_blank">CVE-2017-2964</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to TIFF file parsing. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2965&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2965" target="_blank">CVE-2017-2965</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the image conversion engine related to parsing malformed TIFF segments. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2966&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2966" target="_blank">CVE-2017-2966</a><br><a href="http://www.securityfocus.com/bid/95344" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the XFA engine related to a form's structure and organization. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2967&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2967" target="_blank">CVE-2017-2967</a><br><a href="http://www.securityfocus.com/bid/95345" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability in the JPEG XR codec. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2925&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2925" target="_blank">CVE-2017-2925</a><br><a href="http://www.securityfocus.com/bid/95350" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to processing of atoms in MP4 files. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2926&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2926" target="_blank">CVE-2017-2926</a><br><a href="http://www.securityfocus.com/bid/95350" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2927&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2927" target="_blank">CVE-2017-2927</a><br><a href="http://www.securityfocus.com/bid/95347" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to setting visual mode effects. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2928&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2928" target="_blank">CVE-2017-2928</a><br><a href="http://www.securityfocus.com/bid/95350" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability due to a concurrency error when manipulating a display list. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2930&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2930" target="_blank">CVE-2017-2930</a><br><a href="http://www.securityfocus.com/bid/95350" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to the parsing of SWF metadata. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2931&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2931" target="_blank">CVE-2017-2931</a><br><a href="http://www.securityfocus.com/bid/95350" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript MovieClip class. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2932&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2932" target="_blank">CVE-2017-2932</a><br><a href="http://www.securityfocus.com/bid/95342" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability related to texture compression. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2933&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2933" target="_blank">CVE-2017-2933</a><br><a href="http://www.securityfocus.com/bid/95347" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when parsing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2934&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2934" target="_blank">CVE-2017-2934</a><br><a href="http://www.securityfocus.com/bid/95347" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing the Flash Video container file format. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2935&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2935" target="_blank">CVE-2017-2935</a><br><a href="http://www.securityfocus.com/bid/95347" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2936&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2936" target="_blank">CVE-2017-2936</a><br><a href="http://www.securityfocus.com/bid/95342" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class, when using class inheritance. Successful exploitation could lead to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2937&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2937" target="_blank">CVE-2017-2937</a><br><a href="http://www.securityfocus.com/bid/95342" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- flash_player</td><td style="text-align: left;" align="left">Adobe Flash Player versions 24.0.0.186 and earlier have a security bypass vulnerability related to handling TCP connections.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2938&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2938" target="_blank">CVE-2017-2938</a><br><a href="http://www.securityfocus.com/bid/95341" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/flash-player/apsb17-02.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">bluestacks -- bluestacks</td><td style="text-align: left;" align="left">A local privilege escalation vulnerability exists in BlueStacks App Player. The BlueStacks App Player installer creates a registry key with weak permissions that allows users to execute arbitrary programs with SYSTEM privileges.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4288&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4288" target="_blank">CVE-2016-4288</a><br><a href="http://www.securityfocus.com/bid/92426" target="_blank">Miscellaneous</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0124/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">call-cc -- chicken</td><td style="text-align: left;" align="left">The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buffer overrun. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6830&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6830" target="_blank">CVE-2016-6830</a><br><a href="http://lists.nongnu.org/archive/html/chicken-announce/2016-08/msg00001.html" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/92550" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">codeigniter -- codeigniter</td><td style="text-align: left;" align="left">system/libraries/Email.php in CodeIgniter before 3.1.3 allows remote attackers to execute arbitrary code by leveraging control over the email->from field to insert sendmail command-line arguments.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-10131&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10131" target="_blank">CVE-2016-10131</a><br><a href="https://gist.github.com/Zenexer/40d02da5e07f151adeaeeaa11af9ab36" target="_blank">MISC</a><br><a href="https://github.com/bcit-ci/CodeIgniter/issues/4963" target="_blank">MISC</a><br><a href="https://github.com/bcit-ci/CodeIgniter/pull/4966" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">eclinicalworks -- population_health</td><td style="text-align: left;" align="left">eClinicalWorks Population Health (CCMR) suffers from an SQL injection vulnerability in portalUserService.jsp which allows remote authenticated users to inject arbitrary malicious database commands as part of user input.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-4592&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4592" target="_blank">CVE-2015-4592</a><br><a href="http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/537420/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="https://www.exploit-db.com/exploits/39402/" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">eclinicalworks -- population_health</td><td style="text-align: left;" align="left">eClinicalWorks Population Health (CCMR) suffers from a session fixation vulnerability. When authenticating a user, the application does not assign a new session ID, making it possible to use an existent session ID.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-4594&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4594" target="_blank">CVE-2015-4594</a><br><a href="http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/537420/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="https://www.exploit-db.com/exploits/39402/" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">exponentcms -- exponent_cms</td><td style="text-align: left;" align="left">Exponent CMS 2.3.9 suffers from a remote code execution vulnerability in /install/index.php. An attacker can upload 'php' file to the website through uploader_paste.php, then overwrite /framework/conf/config.php, which leads to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7790&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7790" target="_blank">CVE-2016-7790</a><br><a href="http://www.openwall.com/lists/oss-security/2016/09/22/6" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/93119" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">exponentcms -- exponent_cms</td><td style="text-align: left;" align="left">Exponent CMS 2.3.9 suffers from a remote code execution vulnerability in /install/index.php. An attacker can upload an evil 'exploit.tar.gz' file to the website, then extract it by visiting '/install/index.php?install_sample=../../files/exploit', which leads to arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7791&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7791" target="_blank">CVE-2016-7791</a><br><a href="http://www.openwall.com/lists/oss-security/2016/09/29/11" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/93119" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31350755. References: MT-ALPS02961424.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6784&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6784" target="_blank">CVE-2016-6784</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">lexmark -- perceptive_document_filters</td><td style="text-align: left;" align="left">An exploitable out-of-bounds write exists in the Bzip2 parsing of the Lexmark Perspective Document Filters conversion functionality. A crafted Bzip2 document can lead to a stack-based buffer overflow causing an out-of-bounds write which under the right circumstance could potentially be leveraged by an attacker to gain arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4336&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4336" target="_blank">CVE-2016-4336</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0173/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">libtiff -- libtiff</td><td style="text-align: left;" align="left">LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5225&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5225" target="_blank">CVE-2017-5225</a><br><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2656" target="_blank">CONFIRM</a><br><a href="http://bugzilla.maptools.org/show_bug.cgi?id=2657" target="_blank">CONFIRM</a><br><a href="https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30740545. References: QC-CR#1065916.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6755&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6755" target="_blank">CVE-2016-6755</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31252384. References: QC-CR#1071809.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6791&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6791" target="_blank">CVE-2016-6791</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31253255. References: QC-CR#1072166.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8391&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8391" target="_blank">CVE-2016-8391</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31385862. References: QC-CR#1073136.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8392&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8392" target="_blank">CVE-2016-8392</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31911920.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8393&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8393" target="_blank">CVE-2016-8393</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31913197.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8394&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8394" target="_blank">CVE-2016-8394</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">A denial of service vulnerability in the NVIDIA camera driver could enable an attacker to cause a local permanent denial of service, which may require reflashing the operating system to repair the device. This issue is rated as High due to the possibility of local permanent denial of service. Product: Android. Versions: Kernel-3.10. Android ID: A-31403040. References: N-CVE-2016-8395.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8395&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8395" target="_blank">CVE-2016-8395</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8399&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8399" target="_blank">CVE-2016-8399</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm camera could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31225246. References: QC-CR#1071891.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8412&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8412" target="_blank">CVE-2016-8412</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31750554. References: QC-CR#1079596.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8415&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8415" target="_blank">CVE-2016-8415</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-31606947. References: N-CVE-2016-8424.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8424&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8424" target="_blank">CVE-2016-8424</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-31797770. References: N-CVE-2016-8425.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8425&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8425" target="_blank">CVE-2016-8425</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-31799206. References: N-CVE-2016-8426.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8426&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8426" target="_blank">CVE-2016-8426</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-31799885. References: N-CVE-2016-8427.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8427&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8427" target="_blank">CVE-2016-8427</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-31993456. References: N-CVE-2016-8428.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8428&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8428" target="_blank">CVE-2016-8428</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-32160775. References: N-CVE-2016-8429.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8429&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8429" target="_blank">CVE-2016-8429</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-32225180. References: N-CVE-2016-8430.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8430&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8430" target="_blank">CVE-2016-8430</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32402179. References: N-CVE-2016-8431.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8431&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8431" target="_blank">CVE-2016-8431</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32447738. References: N-CVE-2016-8432.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8432&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8432" target="_blank">CVE-2016-8432</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-32125137. References: QC-CR#1081855.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8434&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8434" target="_blank">CVE-2016-8434</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32700935. References: N-CVE-2016-8435.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8435&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8435" target="_blank">CVE-2016-8435</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32450261. References: QC-CR#1007860.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8436&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8436" target="_blank">CVE-2016-8436</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">Possible buffer overflow in the hypervisor. Inappropriate usage of a static array could lead to a buffer overrun. Product: Android. Versions: Kernel 3.18. Android ID: A-31625904. References: QC-CR#1027769.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8441&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8441" target="_blank">CVE-2016-8441</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">Possible unauthorized memory access in the hypervisor. Lack of input validation could allow hypervisor memory to be accessed by the HLOS. Product: Android. Versions: Kernel 3.18. Android ID: A-31625910. QC-CR#1038173.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8442&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8442" target="_blank">CVE-2016-8442</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">Possible unauthorized memory access in the hypervisor. Incorrect configuration provides access to subsystem page tables. Product: Android. Versions: Kernel 3.18. Android ID: A-32576499. References: QC-CR#964185.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8443&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8443" target="_blank">CVE-2016-8443</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm camera could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31243641. References: QC-CR#1074310.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8444&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8444" target="_blank">CVE-2016-8444</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31798848. References: N-CVE-2016-8449.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8449&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8449" target="_blank">CVE-2016-8449</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-32450563. References: QC-CR#880388.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8450&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8450" target="_blank">CVE-2016-8450</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32506396. References: QC-CR#1050323.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8452&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8452" target="_blank">CVE-2016-8452</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-24739315. References: B-RB#73392.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8453&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8453" target="_blank">CVE-2016-8453</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32174590. References: B-RB#107142.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8454&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8454" target="_blank">CVE-2016-8454</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-32219121. References: B-RB#106311.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8455&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8455" target="_blank">CVE-2016-8455</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32219255. References: B-RB#105580.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8456&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8456" target="_blank">CVE-2016-8456</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32219453. References: B-RB#106116.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8457&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8457" target="_blank">CVE-2016-8457</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31968442.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8458&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8458" target="_blank">CVE-2016-8458</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29000183. References: B-RB#106314.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8464&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8464" target="_blank">CVE-2016-8464</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32474971. References: B-RB#106053.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8465&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8465" target="_blank">CVE-2016-8465</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31822524. References: B-RB#105268.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8466&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8466" target="_blank">CVE-2016-8466</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Binder could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.18. Android ID: A-32394425.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8468&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8468" target="_blank">CVE-2016-8468</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the kernel performance subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32402548.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0403&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0403" target="_blank">CVE-2017-0403</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the kernel sound subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32510733.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0404&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0404" target="_blank">CVE-2017-0404</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">memcached -- memcached</td><td style="text-align: left;" align="left">An integer overflow in the process_bin_append_prepend function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8704&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8704" target="_blank">CVE-2016-8704</a><br><a href="http://www.securityfocus.com/bid/94083" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0219/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">memcached -- memcached</td><td style="text-align: left;" align="left">Multiple integer overflows in process_bin_update function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8705&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8705" target="_blank">CVE-2016-8705</a><br><a href="http://www.securityfocus.com/bid/94083" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0220/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">microsoft -- windows_vista</td><td style="text-align: left;" align="left">The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to cause a denial of service (reboot) via a crafted authentication request, aka "Local Security Authority Subsystem Service Denial of Service Vulnerability."</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0004&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)" target="_blank">7.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0004" target="_blank">CVE-2017-0004</a><br><a href="http://technet.microsoft.com/security/bulletin/MS17-004" target="_blank">MS</a><br><a href="http://www.securityfocus.com/bid/95318" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">microsoft -- word</td><td style="text-align: left;" align="left">Microsoft Word 2016 and SharePoint Enterprise Server 2016 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0003&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0003" target="_blank">CVE-2017-0003</a><br><a href="http://technet.microsoft.com/security/bulletin/MS17-002" target="_blank">MS</a><br><a href="http://www.securityfocus.com/bid/95287" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">php -- php</td><td style="text-align: left;" align="left">In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7479&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7479" target="_blank">CVE-2016-7479</a><br><a href="http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7" target="_blank">MISC</a><br><a href="http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/bid/95151" target="_blank">BID</a><br><a href="https://bugs.php.net/bug.php?id=73092" target="_blank">MISC</a><br><a href="https://www.youtube.com/watch?v=LDcaPstAuPk" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">php -- php</td><td style="text-align: left;" align="left">The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data.</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7480&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7480" target="_blank">CVE-2016-7480</a><br><a href="http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7" target="_blank">MISC</a><br><a href="http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf" target="_blank">MISC</a><br><a href="http://php.net/ChangeLog-7.php" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/bid/95152" target="_blank">BID</a><br><a href="https://bugs.php.net/bug.php?id=73257" target="_blank">MISC</a><br><a href="https://github.com/php/php-src/commit/61cdd1255d5b9c8453be71aacbbf682796ac77d4" target="_blank">MISC</a><br><a href="https://www.youtube.com/watch?v=LDcaPstAuPk" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">php -- php</td><td style="text-align: left;" align="left">Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data.</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5340&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5340" target="_blank">CVE-2017-5340</a><br><a href="http://www.securityfocus.com/bid/95371" target="_blank">BID</a><br><a href="https://bugs.php.net/bug.php?id=73832" target="_blank">CONFIRM</a><br><a href="https://github.com/php/php-src/commit/4cc0286f2f3780abc6084bcdae5dce595daa3c12" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2368&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2368" target="_blank">CVE-2016-2368</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=101" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0136/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pivotal_software -- gemfire_for_pivotal_cloud_foundry</td><td style="text-align: left;" align="left">An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1. The gfsh (Geode Shell) endpoint, used by operators and application developers to connect to their cluster, is unauthenticated and publicly accessible. Because HTTPS communications are terminated at the gorouter, communications from the gorouter to GemFire clusters are unencrypted. An attacker could run any command available on gfsh and could cause denial of service, lost confidentiality of data, escalate privileges, or eavesdrop on other communications between the gorouter and the cluster.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9885&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9885" target="_blank">CVE-2016-9885</a><br><a href="http://www.securityfocus.com/bid/95270" target="_blank">BID</a><br><a href="https://pivotal.io/security/cve-2016-9885" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">python_software_foundation -- hpack</td><td style="text-align: left;" align="left">A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called "HPACK Bomb" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6581&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)" target="_blank">7.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6581" target="_blank">CVE-2016-6581</a><br><a href="http://www.securityfocus.com/bid/92315" target="_blank">BID</a><br><a href="https://python-hyper.org/hpack/en/latest/security/CVE-2016-6581.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ruby-lang -- ruby</td><td style="text-align: left;" align="left">Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface. Attacker passing different type of object than this assumed by developers can cause arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2336&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2336" target="_blank">CVE-2016-2336</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0029/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ruby-lang -- ruby</td><td style="text-align: left;" align="left">Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as "retval" argument can cause arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2337&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2337" target="_blank">CVE-2016-2337</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0031/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ruby-lang -- ruby</td><td style="text-align: left;" align="left">An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2339&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2339" target="_blank">CVE-2016-2339</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0034/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">samsung -- samsung_mobile</td><td style="text-align: left;" align="left">Installing a zero-permission Android application on certain Samsung Android devices with KK(4.4), L(5.0/5.1), and M(6.0) software can continually crash the system_server process in the Android OS. The zero-permission app will create an active install session for a separate app that it has embedded within it. The active install session of the embedded app is performed using the android.content.pm.PackageInstaller class and its nested classes in the Android API. The active install session will write the embedded APK file to the /data/app directory, but the app will not be installed since third-party applications cannot programmatically install apps. Samsung has modified AOSP in order to accelerate the parsing of APKs by introducing the com.android.server.pm.PackagePrefetcher class and its nested classes. These classes will parse the APKs present in the /data/app directory and other directories, even if the app is not actually installed. The embedded APK that was written to the /data/app directory via the active install session has a very large but valid AndroidManifest.xml file. Specifically, the AndroidManifest.xml file contains a very large string value for the name of a permission-tree that it declares. When system_server tries to parse the APK file of the embedded app from the active install session, it will crash due to an uncaught error (i.e., java.lang.OutOfMemoryError) or an uncaught exception (i.e., std::bad_alloc) because of memory constraints. The Samsung Android device will encounter a soft reboot due to a system_server crash, and this action will keep repeating since parsing the APKs in the /data/app directory as performed by the system_server process is part of the normal boot process. The Samsung ID is SVE-2016-6917.</td><td style="text-align: center;" align="center">2017-01-09</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5217&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5217" target="_blank">CVE-2017-5217</a><br><a href="http://security.samsungmobile.com/smrupdate.html#SMR-JAN-2017" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/95319" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">samsung -- samsung_mobile</td><td style="text-align: left;" align="left">Samsung Note devices with KK(4.4), L(5.0/5.1), and M(6.0) software allow attackers to crash the system by creating an arbitrarily large number of active VR service threads. The Samsung ID is SVE-2016-7650.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5351&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)" target="_blank">7.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5351" target="_blank">CVE-2017-5351</a><br><a href="http://security.samsungmobile.com/smrupdate.html#SMR-JAN-2017" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">splunk -- splunk</td><td style="text-align: left;" align="left">Splunk Web in Splunk Enterprise 5.0.x before 5.0.17, 6.0.x before 6.0.13, 6.1.x before 6.1.12, 6.2.x before 6.2.12, 6.3.x before 6.3.8, and 6.4.x before 6.4.4 allows remote attackers to conduct HTTP request injection attacks and obtain sensitive REST API authentication-token information via unspecified vectors, aka SPL-128840.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-10126&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10126" target="_blank">CVE-2016-10126</a><br><a href="https://www.splunk.com/view/SP-CAAAPSR" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">trane -- comfortlink_ii_firmware</td><td style="text-align: left;" align="left">A design flaw in the Trane ComfortLink II SCC firmware version 2.0.2 service allows remote attackers to take complete control of the system.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-2867&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2867" target="_blank">CVE-2015-2867</a><br><a href="http://www.securityfocus.com/bid/95120" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0028/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">trane -- comfortlink_ii_firmware</td><td style="text-align: left;" align="left">An exploitable remote code execution vulnerability exists in the Trane ComfortLink II firmware version 2.0.2 in DSS service. An attacker who can connect to the DSS service on the Trane ComfortLink II device can send an overly long REG request that can overflow a fixed size stack buffer, resulting in arbitrary code execution.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-2868&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2868" target="_blank">CVE-2015-2868</a><br><a href="http://www.securityfocus.com/bid/95118" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0027/" target="_blank">MISC</a></td></tr></tbody></table><a href="https://www.us-cert.gov#top">Back to top</a></div><p><a id="ox-9ad8340aa9-medium" name="medium" class="mce-item-anchor"></a></p><div id="ox-9ad8340aa9-medium_v"><h2 id="ox-9ad8340aa9-medium_v_title">Medium Vulnerabilities</h2><table border="1" summary="Medium Vulnerabilities" align="center"><thead><tr><th class="ox-9ad8340aa9-vendor-product" style="width: 24%;" scope="col">Primary<br>Vendor -- Product</th><th style="width: 44%;" scope="col">Description</th><th style="width: 8%;" scope="col">Published</th><th style="width: 4%;" scope="col">CVSS Score</th><th style="width: 10%;" scope="col">Source & Patch Info</th></tr></thead><tbody><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">adobe -- acrobat_dc</td><td style="text-align: left;" align="left">Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have a security bypass vulnerability when manipulating Form Data Format (FDF).</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2947&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2947" target="_blank">CVE-2017-2947</a><br><a href="http://www.securityfocus.com/bid/95348" target="_blank">BID</a><br><a href="https://helpx.adobe.com/security/products/acrobat/apsb17-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">call-cc -- chicken</td><td style="text-align: left;" align="left">The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6831&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6831" target="_blank">CVE-2016-6831</a><br><a href="http://lists.nongnu.org/archive/html/chicken-announce/2016-08/msg00001.html" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/92550" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">call-cc -- http-client</td><td style="text-align: left;" align="left">The "spiffy-cgi-handlers" egg would convert a nonexistent "Proxy" header to the HTTP_PROXY environment variable, which would allow attackers to direct CGI programs which use this environment variable to use an attacker-specified HTTP proxy server (also known as a "httpoxy" attack). This affects all versions of spiffy-cgi-handlers before 0.5.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6286&vector=(AV:N/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6286" target="_blank">CVE-2016-6286</a><br><a href="http://lists.gnu.org/archive/html/chicken-announce/2016-07/msg00000.html" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/92105" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">call-cc -- http-client</td><td style="text-align: left;" align="left">The "http-client" egg always used a HTTP_PROXY environment variable to determine whether HTTP traffic should be routed via a proxy, even when running as a CGI process. Under several web servers this would mean a user-supplied "Proxy" header could allow an attacker to direct all HTTP requests through a proxy (also known as a "httpoxy" attack). This affects all versions of http-client before 0.10.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6287&vector=(AV:N/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6287" target="_blank">CVE-2016-6287</a><br><a href="http://lists.gnu.org/archive/html/chicken-announce/2016-07/msg00000.html" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/92105" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">d-link -- dgs-1100_firmware</td><td style="text-align: left;" align="left">D-Link DGS-1100 devices with Rev.B firmware 1.01.018 have a hardcoded SSL private key, which allows man-in-the-middle attackers to spoof devices by hijacking an HTTPS session.</td><td style="text-align: center;" align="center">2017-01-09</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-10125&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10125" target="_blank">CVE-2016-10125</a><br><a href="http://www.securityfocus.com/bid/95329" target="_blank">BID</a><br><a href="https://labs.integrity.pt/advisories/dlink-dgs-1100-hardcoded-keys/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">eclinicalworks -- population_health</td><td style="text-align: left;" align="left">eClinicalWorks Population Health (CCMR) suffers from a cross site scripting vulnerability in login.jsp which allows remote unauthenticated users to inject arbitrary javascript via the strMessage parameter.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-4591&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4591" target="_blank">CVE-2015-4591</a><br><a href="http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/537420/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="https://www.exploit-db.com/exploits/39402/" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">eclinicalworks -- population_health</td><td style="text-align: left;" align="left">eClinicalWorks Population Health (CCMR) suffers from a cross-site request forgery (CSRF) vulnerability in portalUserService.jsp which allows remote attackers to hijack the authentication of content administrators for requests that could lead to the creation, modification and deletion of users, appointments and employees.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-4593&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4593" target="_blank">CVE-2015-4593</a><br><a href="http://packetstormsecurity.com/files/135533/eClinicalWorks-Population-Health-CCMR-SQL-Injection-CSRF-XSS.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/537420/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="https://www.exploit-db.com/exploits/39402/" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">emc -- scaleio</td><td style="text-align: left;" align="left">An issue was discovered in EMC ScaleIO versions before 2.0.1.1. A low-privileged local attacker may be able to modify the kernel memory in the SCINI driver and may achieve code execution to escalate privileges to root on ScaleIO Data Client (SDC) servers.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9867&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9867" target="_blank">CVE-2016-9867</a><br><a href="http://www.securityfocus.com/archive/1/539983/30/0/threaded" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/95300" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">f5 -- big-ip_access_policy_manager</td><td style="text-align: left;" align="left">Under certain conditions for BIG-IP systems using a virtual server with an associated FastL4 profile and TCP analytics profile, a specific sequence of packets may cause the Traffic Management Microkernel (TMM) to restart.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9247&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9247" target="_blank">CVE-2016-9247</a><br><a href="https://support.f5.com/csp/#/article/K33500120" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">foxitsoftware -- reader</td><td style="text-align: left;" align="left">A large out-of-bounds read on the heap vulnerability in Foxit PDF Reader can potentially be abused for information disclosure. Combined with another vulnerability, it can be used to leak heap memory layout and in bypassing ASLR.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8334&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8334" target="_blank">CVE-2016-8334</a><br><a href="http://www.securityfocus.com/bid/93799" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0201/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">freeimage_project -- freeimage</td><td style="text-align: left;" align="left">An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5684&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5684" target="_blank">CVE-2016-5684</a><br><a href="http://www.securityfocus.com/bid/93287" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0189/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android</td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Telephony could enable a local malicious application to access system functions beyond its access level. This issue is rated as Moderate because it is a local bypass of restrictions on a constrained process. Product: Android. Versions: 6.0, 6.0.1, 7.0. Android ID: A-31566390.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6771&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6771" target="_blank">CVE-2016-6771</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android</td><td style="text-align: left;" align="left">An information disclosure vulnerability in lvm/wrapper/Bundle/EffectBundle.cpp in libeffects in the Qualcomm audio post processor could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32588756.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0399&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0399" target="_blank">CVE-2017-0399</a><br><a href="https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android</td><td style="text-align: left;" align="left">An information disclosure vulnerability in lvm/wrapper/Bundle/EffectBundle.cpp in libeffects in Audioserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32584034.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0400&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0400" target="_blank">CVE-2017-0400</a><br><a href="https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android</td><td style="text-align: left;" align="left">An information disclosure vulnerability in lvm/wrapper/Bundle/EffectBundle.cpp in libeffects in the Qualcomm audio post processor could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32588016.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0401&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0401" target="_blank">CVE-2017-0401</a><br><a href="https://android.googlesource.com/platform/frameworks/av/+/321ea5257e37c8edb26e66fe4ee78cca4cd915fe" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android</td><td style="text-align: left;" align="left">An information disclosure vulnerability in lvm/wrapper/Bundle/EffectBundle.cpp in libeffects in Audioserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32436341.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0402&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0402" target="_blank">CVE-2017-0402</a><br><a href="https://android.googlesource.com/platform/frameworks/av/+/c66c43ad571ed2590dcd55a762c73c90d9744bac" target="_blank">CONFIRM</a><br><a href="https://android.googlesource.com/platform/hardware/qcom/audio/+/d72ea85c78a1a68bf99fd5804ad9784b4102fe57" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">hancom -- hancom_office_2014</td><td style="text-align: left;" align="left">When opening a Hangul HShow Document (.hpt) and processing a structure within the document, Hancom Office 2014 will attempt to allocate space for a block of data within the file. When calculating this length, the application will use a value from the file and add a constant to it without checking whether the addition of the constant will cause the integer to overflow which will cause the buffer to be undersized when the application tries to copy file data into it. This allows one to overwrite contiguous data in the heap which can lead to code-execution under the context of the application.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4290&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4290" target="_blank">CVE-2016-4290</a><br><a href="http://www.securityfocus.com/bid/92325" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0145/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">hancom -- hancom_office_2014</td><td style="text-align: left;" align="left">When opening a Hangul HShow Document (.hpt) and processing a structure within the document, Hancom Office 2014 will use a field from the structure in an operation that can cause the integer to overflow. This result is then used to allocate memory to copy file data in. Due to the lack of bounds checking on the integer, the allocated memory buffer can be made to be undersized at which point the reading of file data will write outside the bounds of the buffer. This can lead to code execution under the context of the application.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4291&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4291" target="_blank">CVE-2016-4291</a><br><a href="http://www.securityfocus.com/bid/92325" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0146/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">hancom -- hancom_office_2014</td><td style="text-align: left;" align="left">When opening a Hangul HShow Document (.hpt) and processing a structure within the document, Hancom Office 2014 will use a static size to allocate a heap buffer yet explicitly trust a size from the file when modifying data inside of it. Due to this, an aggressor can corrupt memory outside the bounds of this buffer which can lead to code execution under the context of the application.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4292&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4292" target="_blank">CVE-2016-4292</a><br><a href="http://www.securityfocus.com/bid/92325" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0147/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">hancom -- hancom_office_2014</td><td style="text-align: left;" align="left">When opening a Hangul Hcell Document (.cell) and processing a property record within the Workbook stream, Hancom Office 2014 will attempt to allocate space for an element using a length from the file. When copying user-supplied data to this buffer, however, the application will use a different size which leads to a heap-based buffer overflow. This vulnerability can lead to code-execution under the context of the application.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4294&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4294" target="_blank">CVE-2016-4294</a><br><a href="http://www.securityfocus.com/bid/92327" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0149/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">hancom -- hancom_office_2014</td><td style="text-align: left;" align="left">When opening a Hangul Hcell Document (.cell) and processing a particular record within the Workbook stream, an index miscalculation leading to a heap overlow can be made to occur in Hancom Office 2014. The vulnerability occurs when processing data for a formula used to render a chart via the HncChartPlugin.hplg library. Due to a lack of bounds-checking when incrementing an index that is used for writing into a buffer for formulae, the application can be made to write pointer data outside its bounds which can lead to code execution under the context of the application.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4295&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4295" target="_blank">CVE-2016-4295</a><br><a href="http://www.securityfocus.com/bid/92327" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0150/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">hancom -- hancom_office_2014</td><td style="text-align: left;" align="left">When opening a Hangul Hcell Document (.cell) and processing a record that uses the CSSValFormat object, Hancom Office 2014 will search for an underscore ("_") character at the end of the string and write a null terminator after it. If the character is at the very end of the string, the application will mistakenly write the null-byte outside the bounds of its destination. This can result in heap corruption that can lead code execution under the context of the application</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4296&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4296" target="_blank">CVE-2016-4296</a><br><a href="http://www.securityfocus.com/bid/92327" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0151/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">hancom -- hancom_office_2014</td><td style="text-align: left;" align="left">When opening a Hangul HShow Document (.hpt) and processing a structure within the document, Hancom Office 2014 will attempt to allocate space for a list of elements using a length from the file. When calculating this length, an integer overflow can be made to occur which will cause the buffer to be undersized when the application tries to copy file data into the object containing this structure. This allows one to overwrite contiguous data in the heap which can lead to code-execution under the context of the application.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4298&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4298" target="_blank">CVE-2016-4298</a><br><a href="http://www.securityfocus.com/bid/92325" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0144/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- websphere_application_server</td><td style="text-align: left;" align="left">An issue was discovered in Pivotal Spring Security before 3.2.10, 4.1.x before 4.1.4, and 4.2.x before 4.2.1. Spring Security does not consider URL path parameters when processing security constraints. By adding a URL path parameter with an encoded "/" to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. The unexpected presence of path parameters can cause a constraint to be bypassed. Users of Apache Tomcat (all current versions) are not affected by this vulnerability since Tomcat follows the guidance previously provided by the Servlet Expert group and strips path parameters from the value returned by getContextPath(), getServletPath(), and getPathInfo(). Users of other Servlet containers based on Apache Tomcat may or may not be affected depending on whether or not the handling of path parameters has been modified. Users of IBM WebSphere Application Server 8.5.x are known to be affected. Users of other containers that implement the Servlet specification may be affected.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9879&vector=(AV:N/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9879" target="_blank">CVE-2016-9879</a><br><a href="http://www.securityfocus.com/bid/95142" target="_blank">BID</a><br><a href="https://pivotal.io/security/cve-2016-9879" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">intel -- ethernet_controler_xl710_firmware</td><td style="text-align: left;" align="left">A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.</td><td style="text-align: center;" align="center">2017-01-09</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8106&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8106" target="_blank">CVE-2016-8106</a><br><a href="http://www.securityfocus.com/bid/95333" target="_blank">BID</a><br><a href="https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063&languageid=en-fr" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">isc -- bind</td><td style="text-align: left;" align="left">named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9131&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9131" target="_blank">CVE-2016-9131</a><br><a href="http://www.securityfocus.com/bid/95386" target="_blank">BID</a><br><a href="https://kb.isc.org/article/AA-01439/74/CVE-2016-9131" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">isc -- bind</td><td style="text-align: left;" align="left">named in ISC BIND 9.9.9-P4, 9.9.9-S6, 9.10.4-P4, and 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a response containing an inconsistency among the DNSSEC-related RRsets.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9147&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9147" target="_blank">CVE-2016-9147</a><br><a href="https://kb.isc.org/article/AA-01440/74/CVE-2016-9147" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">isc -- bind</td><td style="text-align: left;" align="left">named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9444&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9444" target="_blank">CVE-2016-9444</a><br><a href="https://kb.isc.org/article/AA-01441/74/CVE-2016-9444" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">lexmark -- perceptive_document_filters</td><td style="text-align: left;" align="left">An exploitable buffer overflow exists in the XLS parsing of the Lexmark Perspective Document Filters conversion functionality. A crafted XLS document can lead to a stack based buffer overflow resulting in remote code execution.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4335&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4335" target="_blank">CVE-2016-4335</a><br><a href="http://www.securityfocus.com/bid/92425" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0172/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">lexmark -- perceptive_document_filters</td><td style="text-align: left;" align="left">An exploitable heap overflow vulnerability exists in the Compound Binary File Format (CBFF) parser functionality of Lexmark Perceptive Document Filters library. A specially crafted CBFF file can cause a code execution. An attacker can send a malformed file to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5646&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5646" target="_blank">CVE-2016-5646</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0185/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">libimobiledevice -- libplist</td><td style="text-align: left;" align="left">The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5209&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:P)" target="_blank">6.4</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5209" target="_blank">CVE-2017-5209</a><br><a href="http://www.securityfocus.com/bid/95385" target="_blank">BID</a><br><a href="https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">libtiff -- libtiff</td><td style="text-align: left;" align="left">An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5652&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5652" target="_blank">CVE-2016-5652</a><br><a href="http://www.securityfocus.com/bid/93902" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0187/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31651010.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8405&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8405" target="_blank">CVE-2016-8405</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linuxcontainers -- lxc</td><td style="text-align: left;" align="left">An issue was discovered in Linux Containers (LXC) before 2016-02-22. When executing a program via lxc-attach, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the container.</td><td style="text-align: center;" align="center">2017-01-09</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-10124&vector=(AV:N/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10124" target="_blank">CVE-2016-10124</a><br><a href="https://github.com/lxc/lxc/commit/e986ea3dfa4a2957f71ae9bfaed406dd6e1ffff6" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">mantisbt -- mantisbt</td><td style="text-align: left;" align="left">Cross-site scripting (XSS) vulnerability in MantisBT Filter API in MantisBT versions before 1.2.19, and versions 2.0.0-beta1, 1.3.0-beta1 allows remote attackers to inject arbitrary web script or HTML via the 'view_type' parameter.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6837&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6837" target="_blank">CVE-2016-6837</a><br><a href="http://www.securityfocus.com/bid/92522" target="_blank">BID</a><br><a href="http://www.securitytracker.com/id/1036655" target="_blank">SECTRACK</a><br><a href="https://github.com/mantisbt/mantisbt/commit/7086c2d8b4b20ac14013b36761ac04f0abf21a4e" target="_blank">CONFIRM</a><br><a href="https://mantisbt.org/bugs/view.php?id=21611" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">matroska -- libebml</td><td style="text-align: left;" align="left">A specially crafted unicode string in libebml master branch can cause an off-by-few read on the heap in unicode string parsing code in libebml. This issue can potentially be used for information leaks.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-1514&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1514" target="_blank">CVE-2016-1514</a><br><a href="http://www.securityfocus.com/bid/95124" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0036/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">matroska -- libebml</td><td style="text-align: left;" align="left">A use-after-free / double-free vulnerability can occur in libebml master branch while parsing Track elements of the MKV container.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-1515&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1515" target="_blank">CVE-2016-1515</a><br><a href="http://www.securityfocus.com/bid/94924" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0037/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">memcached -- memcached</td><td style="text-align: left;" align="left">An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8706&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8706" target="_blank">CVE-2016-8706</a><br><a href="http://www.securityfocus.com/bid/94083" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0221/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">metalgenix -- genixcms</td><td style="text-align: left;" align="left">SQL injection vulnerability in inc/lib/Control/Ajax/tags-ajax.control.php in GeniXCMS 0.0.8 allows remote authenticated editors to execute arbitrary SQL commands via the term parameter to the default URI.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5345&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)" target="_blank">6.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5345" target="_blank">CVE-2017-5345</a><br><a href="https://github.com/semplon/GeniXCMS/commit/6e21c01d87672d81080450e6913e0093a02bfab8" target="_blank">MISC</a><br><a href="https://github.com/semplon/GeniXCMS/issues/60" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">metalgenix -- genixcms</td><td style="text-align: left;" align="left">SQL injection vulnerability in inc/lib/Control/Backend/posts.control.php in GeniXCMS 0.0.8 allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter to gxadmin/index.php.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5346&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)" target="_blank">6.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5346" target="_blank">CVE-2017-5346</a><br><a href="https://github.com/semplon/GeniXCMS/issues/61" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">metalgenix -- genixcms</td><td style="text-align: left;" align="left">SQL injection vulnerability in inc/mod/newsletter/options.php in GeniXCMS 0.0.8 allows remote authenticated administrators to execute arbitrary SQL commands via the recipient parameter to gxadmin/index.php.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5347&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)" target="_blank">6.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5347" target="_blank">CVE-2017-5347</a><br><a href="https://github.com/semplon/GeniXCMS/issues/61" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">microsoft -- edge</td><td style="text-align: left;" align="left">Microsoft Edge allows remote attackers to bypass the Same Origin Policy via vectors involving the about:blank URL and data: URLs, aka "Microsoft Edge Elevation of Privilege Vulnerability."</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0002&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0002" target="_blank">CVE-2017-0002</a><br><a href="http://technet.microsoft.com/security/bulletin/MS17-001" target="_blank">MS</a><br><a href="http://www.securityfocus.com/bid/95284" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">netapp -- clustered_data_ontap</td><td style="text-align: left;" align="left">Clustered Data ONTAP versions 8.0, 8.3.1, and 8.3.2 contain a default privileged account which under certain conditions can be used for unauthorized information disclosure.</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-8020&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8020" target="_blank">CVE-2015-8020</a><br><a href="http://www.securityfocus.com/bid/92329" target="_blank">BID</a><br><a href="https://kb.netapp.com/support/s/article/cve-2015-8020-default-privileged-account-credentials-vulnerability-in-in-clustered-data-ontap?language=en_US" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">netapp -- metrocluster_tiebreaker</td><td style="text-align: left;" align="left">MetroCluster Tiebreaker for clustered Data ONTAP in versions before 1.2 discloses sensitive information in cleartext which may be viewed by an unauthenticated user.</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6820&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6820" target="_blank">CVE-2016-6820</a><br><a href="http://www.securityfocus.com/bid/92495" target="_blank">BID</a><br><a href="https://kb.netapp.com/support/s/article/cve-2016-6820-sensitive-information-disclosure-in-metrocluster-tiebreaker-for-clustered-data-ontap?language=en_US" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">netop -- remote_control</td><td style="text-align: left;" align="left">Stack-based buffer overflow vulnerability in Netop Remote Control versions 11.53, 12.21 and prior. The affected module in the Guest client is the "Import to Phonebook" option. When a specially designed malicious file containing special characters is loaded, the overflow occurs. 12.51 is the fixed version. The Support case ref is 00109744.</td><td style="text-align: center;" align="center">2017-01-09</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5216&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5216" target="_blank">CVE-2017-5216</a><br><a href="http://www.netop.com/fileadmin/netop/resources/products/administration/remote_control/release_notes/NetopRemoteControl_12.51_ModificationNotes_final.pdf" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/95316" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp</td><td style="text-align: left;" align="left">An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-1547&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547" target="_blank">CVE-2016-1547</a><br><a href="http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" target="_blank">CONFIRM</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/88276" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0081/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp</td><td style="text-align: left;" align="left">An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-1548&vector=(AV:N/AC:L/Au:N/C:N/I:P/A:P)" target="_blank">6.4</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548" target="_blank">CVE-2016-1548</a><br><a href="http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" target="_blank">CONFIRM</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/88264" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0082/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp</td><td style="text-align: left;" align="left">A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-1549&vector=(AV:N/AC:L/Au:S/C:N/I:P/A:N)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549" target="_blank">CVE-2016-1549</a><br><a href="http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/88200" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0083/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp</td><td style="text-align: left;" align="left">An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-1550&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550" target="_blank">CVE-2016-1550</a><br><a href="http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" target="_blank">CONFIRM</a><br><a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/88261" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0084/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp-dev</td><td style="text-align: left;" align="left">An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-7848&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848" target="_blank">CVE-2015-7848</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2015-0052/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">php -- php</td><td style="text-align: left;" align="left">Zend/zend_exceptions.c in PHP, possibly 5.x before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (infinite loop) via a crafted Exception object in serialized data, a related issue to CVE-2015-8876.</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7478&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7478" target="_blank">CVE-2016-7478</a><br><a href="http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7" target="_blank">MISC</a><br><a href="http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/bid/95150" target="_blank">BID</a><br><a href="https://bugs.php.net/bug.php?id=73093" target="_blank">MISC</a><br><a href="https://www.youtube.com/watch?v=LDcaPstAuPk" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a null pointer dereference. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2365&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2365" target="_blank">CVE-2016-2365</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=98" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0133/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2366&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2366" target="_blank">CVE-2016-2366</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=99" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0134/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">A NULL pointer dereference vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a denial of service vulnerability. A malicious server can send a packet starting with a NULL byte triggering the vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2369&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2369" target="_blank">CVE-2016-2369</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=102" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0137/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in an out-of-bounds read. A malicious server or man-in-the-middle attacker can send invalid data to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2370&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2370" target="_blank">CVE-2016-2370</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=103" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0138/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could cause memory corruption resulting in code execution.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2371&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2371" target="_blank">CVE-2016-2371</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=104" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0139/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle attacker can send an invalid size for a file transfer which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the file is sent to another user.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2372&vector=(AV:N/AC:M/Au:S/C:P/I:N/A:P)" target="_blank">4.9</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2372" target="_blank">CVE-2016-2372</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=105" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0140/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or user can send an invalid mood to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2373&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2373" target="_blank">CVE-2016-2373</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=106" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0141/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2374&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2374" target="_blank">CVE-2016-2374</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=107" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0142/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">An exploitable out-of-bounds read exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT contact information sent from the server can result in memory disclosure.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2375&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2375" target="_blank">CVE-2016-2375</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=108" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0143/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or an attacker who intercepts the network traffic can send an invalid size for a packet which will trigger a buffer overflow.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2376&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2376" target="_blank">CVE-2016-2376</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=92" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0118/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent by the server could potentially result in an out-of-bounds write of one byte. A malicious server can send a negative content-length in response to a HTTP request triggering the vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2377&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2377" target="_blank">CVE-2016-2377</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=93" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0119/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2378&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2378" target="_blank">CVE-2016-2378</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=94" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0120/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent to the server could potentially result in an out-of-bounds read. A user could be convinced to enter a particular string which would then get converted incorrectly and could lead to a potential out-of-bounds read.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2380&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2380" target="_blank">CVE-2016-2380</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=96" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0123/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">A directory traversal exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in an overwrite of files. A malicious server or someone with access to the network traffic can provide an invalid filename for a splash image triggering the vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4323&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:P)" target="_blank">5.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4323" target="_blank">CVE-2016-4323</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=97" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0128/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">python_software_foundation -- python_priority_library</td><td style="text-align: left;" align="left">A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree.</td><td style="text-align: center;" align="center">2017-01-10</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6580&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6580" target="_blank">CVE-2016-6580</a><br><a href="http://www.securityfocus.com/bid/92311" target="_blank">BID</a><br><a href="https://python-hyper.org/priority/en/latest/security/CVE-2016-6580.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">samsung -- samsung_mobile</td><td style="text-align: left;" align="left">Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allow attackers to crash systemUI by leveraging incomplete exception handling. The Samsung ID is SVE-2016-7122.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5350&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5350" target="_blank">CVE-2017-5350</a><br><a href="http://security.samsungmobile.com/smrupdate.html#SMR-JAN-2017" target="_blank">CONFIRM</a></td></tr></tbody></table><a href="https://www.us-cert.gov#top">Back to top</a></div><p><a id="ox-9ad8340aa9-low" name="low" class="mce-item-anchor"></a></p><div id="ox-9ad8340aa9-low_v"><h2 id="ox-9ad8340aa9-low_v_title">Low Vulnerabilities</h2><table border="1" summary="Low Vulnerabilities" align="center"><thead><tr><th class="ox-9ad8340aa9-vendor-product" style="width: 24%;" scope="col">Primary<br>Vendor -- Product</th><th style="width: 44%;" scope="col">Description</th><th style="width: 8%;" scope="col">Published</th><th style="width: 4%;" scope="col">CVSS Score</th><th style="width: 10%;" scope="col">Source & Patch Info</th></tr></thead><tbody><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">emc -- scaleio</td><td style="text-align: left;" align="left">An issue was discovered in EMC ScaleIO versions before 2.0.1.1. A low-privileged local attacker may cause a denial-of-service by generating a kernel panic in the SCINI driver using IOCTL calls which may render the ScaleIO Data Client (SDC) server unavailable until the next reboot.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9868&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9868" target="_blank">CVE-2016-9868</a><br><a href="http://www.securityfocus.com/archive/1/539983/30/0/threaded" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/95301" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">emc -- scaleio</td><td style="text-align: left;" align="left">An issue was discovered in EMC ScaleIO versions before 2.0.1.1. Incorrect permissions on the SCINI driver may allow a low-privileged local attacker to modify the configuration and render the ScaleIO Data Client (SDC) server unavailable.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9869&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9869" target="_blank">CVE-2016-9869</a><br><a href="http://www.securityfocus.com/archive/1/539983/30/0/threaded" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/95303" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android</td><td style="text-align: left;" align="left">An information disclosure vulnerability in Package Manager could enable a local malicious application to bypass operating system protections that isolate application data from other applications. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: 7.0. Android ID: A-31251489.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6774&vector=(AV:N/AC:H/Au:N/C:P/I:N/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6774" target="_blank">CVE-2016-6774</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">kaspersky -- anti-virus</td><td style="text-align: left;" align="left">A local denial of service vulnerability exists in window broadcast message handling functionality of Kaspersky Anti-Virus software. Sending certain unhandled window messages, an attacker can cause application termination and in the same way bypass KAV self-protection mechanism.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4329&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4329" target="_blank">CVE-2016-4329</a><br><a href="http://www.securityfocus.com/bid/92771" target="_blank">BID</a><br><a href="http://www.securityfocus.com/bid/92771/info" target="_blank">Miscellaneous</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0175/" target="_blank">MISC</a><br><a href="https://support.kaspersky.com/vulnerability.aspx?el=12430#010916" target="_blank">Miscellaneous</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">kaspersky -- internet_security</td><td style="text-align: left;" align="left">A denial of service vulnerability exists in the syscall filtering functionality of the Kaspersky Internet Security KLIF driver. A specially crafted native api call request can cause a access violation exception in KLIF kernel driver resulting in local denial of service. An attacker can run program from user-mode to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4304&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4304" target="_blank">CVE-2016-4304</a><br><a href="http://securitytracker.com/id/1036702" target="_blank">Miscellaneous</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0166/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">kaspersky -- internet_security</td><td style="text-align: left;" align="left">A denial of service vulnerability exists in the syscall filtering functionality of Kaspersky Internet Security KLIF driver. A specially crafted native api call can cause a access violation in KLIF kernel driver resulting in local denial of service. An attacker can run program from user-mode to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4305&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4305" target="_blank">CVE-2016-4305</a><br><a href="http://securitytracker.com/id/1036702" target="_blank">Miscellaneous</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0167/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">kaspersky -- internet_security</td><td style="text-align: left;" align="left">A denial of service vulnerability exists in the IOCTL handling functionality of Kaspersky Internet Security KL1 driver. A specially crafted IOCTL signal can cause an access violation in KL1 kernel driver resulting in local system denial of service. An attacker can run a program from user-mode to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4307&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4307" target="_blank">CVE-2016-4307</a><br><a href="http://securitytracker.com/id/1036702" target="_blank">Miscellaneous</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0169/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">kaspersky -- total_security</td><td style="text-align: left;" align="left">Multiple information leaks exist in various IOCTL handlers of the Kaspersky Internet Security KLDISK driver. Specially crafted IOCTL requests can cause the driver to return out-of-bounds kernel memory, potentially leaking sensitive information such as privileged tokens or kernel memory addresses that may be useful in bypassing kernel mitigations. An unprivileged user can run a program from user-mode to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4306&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4306" target="_blank">CVE-2016-4306</a><br><a href="http://securitytracker.com/id/1036702" target="_blank">Miscellaneous</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0168/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An information disclosure vulnerability in Qualcomm components including the camera driver and video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29464815. References: QC-CR#1042068.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6756&vector=(AV:N/AC:H/Au:N/C:P/I:N/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6756" target="_blank">CVE-2016-6756</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An information disclosure vulnerability in Qualcomm components including the camera driver and video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30148242. References: QC-CR#1052821.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6757&vector=(AV:N/AC:H/Au:N/C:P/I:N/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6757" target="_blank">CVE-2016-6757</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An information disclosure vulnerability in the STMicroelectronics driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31795790.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8473&vector=(AV:N/AC:H/Au:N/C:P/I:N/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8473" target="_blank">CVE-2016-8473</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An information disclosure vulnerability in the STMicroelectronics driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31799972.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8474&vector=(AV:N/AC:H/Au:N/C:P/I:N/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8474" target="_blank">CVE-2016-8474</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">An information disclosure vulnerability in the HTC input driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-32591129.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8475&vector=(AV:N/AC:H/Au:N/C:P/I:N/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8475" target="_blank">CVE-2016-8475</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">pidgin -- pidgin</td><td style="text-align: left;" align="left">An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle can send an invalid size for an avatar which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the avatar is sent to another user.</td><td style="text-align: center;" align="center">2017-01-06</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-2367&vector=(AV:N/AC:M/Au:S/C:N/I:N/A:P)" target="_blank">3.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2367" target="_blank">CVE-2016-2367</a><br><a href="http://www.debian.org/security/2016/dsa-3620" target="_blank">DEBIAN</a><br><a href="http://www.pidgin.im/news/security/?id=100" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/91335" target="_blank">BID</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0135/" target="_blank">MISC</a><br><a href="http://www.ubuntu.com/usn/USN-3031-1" target="_blank">UBUNTU</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">python -- urllib3</td><td style="text-align: left;" align="left">Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9015&vector=(AV:N/AC:H/Au:N/C:P/I:N/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9015" target="_blank">CVE-2016-9015</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/27/6" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/93941" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">web2py -- web2py</td><td style="text-align: left;" align="left">Web2py versions 2.14.5 and below was affected by Reflected XSS vulnerability, which allows an attacker to perform an XSS attack on logged in user (admin).</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4807&vector=(AV:N/AC:M/Au:S/C:N/I:P/A:N)" target="_blank">3.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4807" target="_blank">CVE-2016-4807</a><br><a href="http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html" target="_blank">MISC</a><br><a href="https://www.exploit-db.com/exploits/39821/" target="_blank">EXPLOIT-DB</a></td></tr></tbody></table><a href="https://www.us-cert.gov#top">Back to top</a></div><p><a id="ox-9ad8340aa9-severity_not_yet_assigned" name="severity_not_yet_assigned" class="mce-item-anchor"></a></p><div id="ox-9ad8340aa9-snya_v"><h2 id="ox-9ad8340aa9-snya_v_title">Severity Not Yet Assigned</h2><table id="ox-9ad8340aa9-table_severity_not_yet_assigned" border="1" summary="Severity Not Yet Assigned" align="center"><thead><tr><th class="ox-9ad8340aa9-vendor-product" style="width: 24%;" scope="col">Primary<br>Vendor -- Product</th><th style="width: 44%;" scope="col">Description</th><th style="width: 8%;" scope="col">Published</th><th style="width: 4%;" scope="col">CVSS Score</th><th style="width: 10%;" scope="col">Source & Patch Info</th></tr></thead><tbody><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">apache -- apache_storm<br> </td><td style="text-align: left;" align="left">The UI daemon in Apache Storm 0.10.0 before 0.10.0-beta1 allows remote attackers to execute arbitrary code via unspecified vectors.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3188" target="_blank">CVE-2015-3188</a><br><a href="http://packetstormsecurity.com/files/132417/Apache-Storm-0.10.0-beta-Code-Execution.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/535804/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="http://www.securitytracker.com/id/1032695" target="_blank">SECTRACK</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">apache -- apache<br> </td><td style="text-align: left;" align="left">Information disclosure and authentication bypass vulnerability exists in the Apache HTTP Server configuration bundled with ZoneMinder v1.30.0, which allows a remote unauthenticated attacker to browse all directories in the web root, e.g., a remote unauthenticated attacker can view all CCTV images on the server.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10140" target="_blank">CVE-2016-10140</a><br><a href="https://github.com/ZoneMinder/ZoneMinder/pull/1697" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">artifex -- artifex<br> </td><td style="text-align: left;" align="left">An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10141" target="_blank">CVE-2016-10141</a><br><a href="http://git.ghostscript.com/?p=mujs.git;h=fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045" target="_blank">CONFIRM</a><br><a href="https://bugs.ghostscript.com/show_bug.cgi?id=697448" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">barco -- clickshare<br> </td><td style="text-align: left;" align="left">Directory traversal vulnerability in the wallpaper parsing functionality in Barco ClickShare CSC-1 devices with firmware before 01.09.03, CSM-1 devices with firmware before 01.06.02, and CSE-200 devices with firmware before 01.03.02 allows remote attackers to read /etc/shadow via unspecified vectors.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3151" target="_blank">CVE-2016-3151</a><br><a href="http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/539754/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="http://www.securityfocus.com/bid/94330" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">barco -- clickshare<br> </td><td style="text-align: left;" align="left">Barco ClickShare CSC-1 devices with firmware before 01.09.03 and CSM-1 devices with firmware before 01.06.02 allow remote attackers to execute arbitrary code via unspecified vectors.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3149" target="_blank">CVE-2016-3149</a><br><a href="http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/539754/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="http://www.securityfocus.com/bid/94323" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">barco -- clickshare<br> </td><td style="text-align: left;" align="left">Cross-site scripting (XSS) vulnerability in wallpaper.php in the Base Unit in Barco ClickShare CSC-1 devices with firmware before 01.09.03, CSM-1 devices with firmware before 01.06.02, and CSE-200 devices with firmware before 01.03.02 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3150" target="_blank">CVE-2016-3150</a><br><a href="http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/539754/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="http://www.securityfocus.com/bid/94330" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">barco -- clickshare<br> </td><td style="text-align: left;" align="left">Barco ClickShare CSC-1 devices with firmware before 01.09.03 allow remote attackers to obtain the root password by downloading and extracting the firmware image.</td><td style="text-align: center;" align="center">2017-01-12</td><td>not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3152" target="_blank">CVE-2016-3152</a><br><a href="http://packetstormsecurity.com/files/139713/Barco-ClickShare-XSS-Remote-Code-Execution-Path-Traversal.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/539754/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="http://www.securityfocus.com/bid/94326" target="_blank">BID</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">blackberry -- blackberry_enterprise_server<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the Core and Management Console in BlackBerry Enterprise Server (BES) 12 through 12.5.2 allows remote attackers to obtain local or domain credentials of an administrator or user account by sniffing traffic between the two elements during a login attempt.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3130" target="_blank">CVE-2016-3130</a><br><a href="http://support.blackberry.com/kb/articleDetail?articleNumber=000038914" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">blackberry -- blackberry_enterprise_server<br> </td><td style="text-align: left;" align="left">A spoofing vulnerability in the Core of BlackBerry Enterprise Server (BES) 12 through 12.5.2 allows remote attackers to enroll an illegitimate device to the BES, gain access to device parameters for the BES, or send false information to the BES by gaining access to specific information about a device that was legitimately enrolled on the BES.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3128" target="_blank">CVE-2016-3128</a><br><a href="http://support.blackberry.com/kb/articleDetail?articleNumber=000038913" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">blackberry -- blackberry<br> </td><td style="text-align: left;" align="left">A reflected cross-site scripting vulnerability in the BlackBerry WatchDox Server components Appliance-X, version 1.8.1 and earlier, and vAPP, versions 4.6.0 to 5.4.1, allows remote attackers to execute script commands in the context of the affected browser by persuading a user to click an attacker-supplied malicious link.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3890" target="_blank">CVE-2017-3890</a><br><a href="http://support.blackberry.com/kb/articleDetail?articleNumber=000038915" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">brocade -- network_advisor<br> </td><td style="text-align: left;" align="left">A Directory Traversal vulnerability in CliMonitorReportServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to read arbitrary files including files with sensitive user information.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8207" target="_blank">CVE-2016-8207</a><br><a href="https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2016-180.htm" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">brocade -- network_advisor<br> </td><td style="text-align: left;" align="left">A Directory Traversal vulnerability in DashboardFileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8205" target="_blank">CVE-2016-8205</a><br><a href="https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2016-178.htm" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">brocade -- network_advisor<br> </td><td style="text-align: left;" align="left">A Directory Traversal vulnerability in servlet SoftwareImageUpload in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to write to arbitrary files, and consequently delete the files.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8206" target="_blank">CVE-2016-8206</a><br><a href="https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2016-179.htm" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">brocade -- network_advisor<br> </td><td style="text-align: left;" align="left">A Directory Traversal vulnerability in FileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8204" target="_blank">CVE-2016-8204</a><br><a href="https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2016-177.htm" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">brocade -- virtual_traffic_manager<br> </td><td style="text-align: left;" align="left">A CSRF vulnerability in Brocade Virtual Traffic Manager versions released prior to and including 11.0 could allow an attacker to trick a logged-in user into making administrative changes on the traffic manager cluster.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8201" target="_blank">CVE-2016-8201</a><br><a href="https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2016-209.htm" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">cloud_foundry -- cloud_controller<br> </td><td style="text-align: left;" align="left">An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0. Cloud Foundry logs the credentials returned from service brokers in Cloud Controller system component logs. These logs are written to disk and often sent to a log aggregator via syslog.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9882" target="_blank">CVE-2016-9882</a><br><a href="https://www.cloudfoundry.org/cve-2016-9882/" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">foxit -- foxit_pdf_toolkit<br> </td><td style="text-align: left;" align="left">Memory Corruption Vulnerability in Foxit PDF Toolkit v1.3 allows an attacker to cause Denial of Service and Remote Code Execution when the victim opens the specially crafted PDF file. The Vulnerability has been fixed in v2.0.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5364" target="_blank">CVE-2017-5364</a><br><a href="https://www.foxitsoftware.com/support/security-bulletins.php" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gajim -- gajim<br> </td><td style="text-align: left;" align="left">The OTR plugin for Gajim sends information in cleartext when using XHTML, which allows remote attackers to obtain sensitive information via unspecified vectors.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9107" target="_blank">CVE-2016-9107</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/30/11" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/30/2" target="_blank">MLIST</a><br><a href="https://dev.gajim.org/gajim/gajim-plugins/issues/145" target="_blank">CONFIRM</a><br><a href="https://trac-plugins.gajim.org/changeset/c7c2e519ed63377bc943dd01c4661b0fe49321ae" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gerrit -- puppet<br> </td><td style="text-align: left;" align="left">The Gerrit configuration in the Openstack Puppet module for Gerrit (aka puppet-gerrit) improperly marks text/html as a safe mimetype, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a crafted review.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5737" target="_blank">CVE-2016-5737</a><br><a href="http://www.openwall.com/lists/oss-security/2016/06/22/2" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/91352" target="_blank">BID</a><br><a href="https://github.com/openstack-infra/puppet-gerrit/commit/8573c2ee172f66c1667de49685c88fdc8883ca8b" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gnu -- guile<br> </td><td style="text-align: left;" align="left">The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to execute arbitrary code via an HTTP inter-protocol attack.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8606" target="_blank">CVE-2016-8606</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/12/2" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/93514" target="_blank">BID</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QTAGSDCTYXTABAA77BQJGNKOOBRV4DK/" target="_blank">FEDORA</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNVE5N24FLWDYBQ3LAFMF6BFCWKDO7VM/" target="_blank">FEDORA</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJP5S36GTXMDEBXWF6LKKV76DSLNQG44/" target="_blank">FEDORA</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gnu -- guile<br> </td><td style="text-align: left;" align="left">The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2.0.13. Prior versions are affected.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8605" target="_blank">CVE-2016-8605</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/12/1" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/93510" target="_blank">BID</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QTAGSDCTYXTABAA77BQJGNKOOBRV4DK/" target="_blank">FEDORA</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNVE5N24FLWDYBQ3LAFMF6BFCWKDO7VM/" target="_blank">FEDORA</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJP5S36GTXMDEBXWF6LKKV76DSLNQG44/" target="_blank">FEDORA</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm bootloader could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-31399736. References: QC-CR#1000546.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8423" target="_blank">CVE-2016-8423</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-31750190. References: MT-ALPS02974192.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8433" target="_blank">CVE-2016-8433</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Qualcomm bootloader could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-31471220. References: QC-CR#979426.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8422" target="_blank">CVE-2016-8422</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the Qualcomm sound driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31498403. References: QC-CR#987010.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8410&vector=(AV:N/AC:H/Au:N/C:P/I:N/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8410" target="_blank">CVE-2016-8410</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31495687. References: N-CVE-2016-8409.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8409&vector=(AV:N/AC:H/Au:N/C:P/I:N/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8409" target="_blank">CVE-2016-8409</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">Improper input validation in Access Control APIs. Access control API may return memory range checking incorrectly. Product: Android. Versions: Kernel 3.18. Android ID: A-31623057. References: QC-CR#1009695.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8437" target="_blank">CVE-2016-8437</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">Integer overflow leading to a TOCTOU condition in hypervisor PIL. An integer overflow exposes a race condition that may be used to bypass (Peripheral Image Loader) PIL authentication. Product: Android. Versions: Kernel 3.18. Android ID: A-31624565. References: QC-CR#1023638.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8438" target="_blank">CVE-2016-8438</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in MediaTek components, including the thermal driver and video driver, could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31749463. References: MT-ALPS02968886.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8447" target="_blank">CVE-2016-8447</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in MediaTek components, including the thermal driver and video driver, could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31747749. References: MT-ALPS02968909.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8446" target="_blank">CVE-2016-8446</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in MediaTek components, including the thermal driver and video driver, could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31747590. References: MT-ALPS02968983.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8445" target="_blank">CVE-2016-8445</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">Possible buffer overflow in trust zone access control API. Buffer overflow may occur due to lack of buffer size checking. Product: Android. Versions: Kernel 3.18. Android ID: A-31625204. References: QC-CR#1027804.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8439" target="_blank">CVE-2016-8439</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31496571. References: N-CVE-2016-8408.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8408&vector=(AV:N/AC:H/Au:N/C:P/I:N/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8408" target="_blank">CVE-2016-8408</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31802656.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8407&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8407" target="_blank">CVE-2016-8407</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in Audioserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android IDs: A-32438594, A-32635664.</td><td style="text-align: center;" align="center">2017-01-13</td><td>not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0398" target="_blank">CVE-2017-0398</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31495231.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8402&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8402" target="_blank">CVE-2016-8402</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31494725.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8401&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8401" target="_blank">CVE-2016-8401</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the NVIDIA librm library (libnvrm) could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: Kernel-3.18. Android ID: A-31251599. References: N-CVE-2016-8400.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8400" target="_blank">CVE-2016-8400</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in id3/ID3.cpp in libstagefright in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32377688.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0397&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0397" target="_blank">CVE-2017-0397</a><br><a href="https://android.googlesource.com/platform/frameworks/av/+/7a3246b870ddd11861eda2ab458b11d723c7f62c" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in visualizer/EffectVisualizer.cpp in libeffects in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31781965.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0396&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0396" target="_blank">CVE-2017-0396</a><br><a href="https://android.googlesource.com/platform/frameworks/av/+/557bd7bfe6c4895faee09e46fc9b5304a956c8b7" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31496950.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8404&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8404" target="_blank">CVE-2016-8404</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31495348.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8403&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8403" target="_blank">CVE-2016-8403</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in Telephony could enable a remote attacker to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31752213.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0394" target="_blank">CVE-2017-0394</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Contacts could enable a local malicious application to silently create contact information. This issue is rated as Moderate because it is a local bypass of user interaction requirements (access to functionality that would normally require either user initiation or user permission). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32219099.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0395&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0395" target="_blank">CVE-2017-0395</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in MediaTek components, including the thermal driver and video driver, could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31791148. References: MT-ALPS02982181.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8448" target="_blank">CVE-2016-8448</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.4. Android ID: A-32178033.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8451" target="_blank">CVE-2016-8451</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A remote code execution vulnerability in the Framesequence library could enable an attacker using a specially crafted file to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses the Framesequence library. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32338390.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0382" target="_blank">CVE-2017-0382</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Framework APIs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 7.0, 7.1. Android ID: A-31677614.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0383" target="_blank">CVE-2017-0383</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A remote code execution vulnerability in silk/NLSF_stabilize.c in libopus in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31607432.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0381" target="_blank">CVE-2017-0381</a><br><a href="https://android.googlesource.com/platform/external/libopus/+/0d052d64480a30e83fcdda80f4774624e044beb7" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in decoder/ihevcd_decode.c in libhevc in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32322258.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0391&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0391" target="_blank">CVE-2017-0391</a><br><a href="https://android.googlesource.com/platform/external/libhevc/+/a33f6725d7e9f92330f995ce2dcf4faa33f6433f" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in VBRISeeker.cpp in libstagefright in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32577290.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0392&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0392" target="_blank">CVE-2017-0392</a><br><a href="https://android.googlesource.com/platform/frameworks/av/+/453b351ac5bd2b6619925dc966da60adf6b3126c" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in lvm/wrapper/Bundle/EffectBundle.cpp in libeffects in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32095626.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0384&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0384" target="_blank">CVE-2017-0384</a><br><a href="https://android.googlesource.com/platform/frameworks/av/+/321ea5257e37c8edb26e66fe4ee78cca4cd915fe" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32585400.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0385&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0385" target="_blank">CVE-2017-0385</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in Tremolo/dpen.s in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31647370.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0390&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0390" target="_blank">CVE-2017-0390</a><br><a href="https://android.googlesource.com/platform/external/tremolo/+/5dc99237d49e73c27d3eca54f6ccd97d13f94de0" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the External Storage Provider could enable a local secondary user to read data from an external storage SD card inserted by the primary user. This issue is rated as High because it is a general bypass for operating system protections that isolate application data from other applications. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32523490.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0388" target="_blank">CVE-2017-0388</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Mediaserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32660278.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0387" target="_blank">CVE-2017-0387</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the libnl library could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32255299.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0386" target="_blank">CVE-2017-0386</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in libvpx in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-30436808.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-0393&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0393" target="_blank">CVE-2017-0393</a><br><a href="https://android.googlesource.com/platform/external/libvpx/+/6886e8e0a9db2dbad723dc37a548233e004b33bc" target="_blank">CONFIRM</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">Unauthenticated messages processed by the UE. Certain NAS messages are processed when no EPS security context exists in the UE. Product: Android. Versions: Kernel 3.18. Android ID: A-31548486. References: QC-CR#877705.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8398" target="_blank">CVE-2016-8398</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the bootloader could enable a local attacker to access data outside of its permission level. This issue is rated as High because it could be used to access sensitive data. Product: Android. Versions: N/A. Android ID: A-32510383.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8462" target="_blank">CVE-2016-8462</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the bootloader could enable a local attacker to access data outside of its permission level. This issue is rated as High because it could be used to access sensitive data. Product: Android. Versions: Kernel-3.18. Android ID: A-32369621.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8461&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8461" target="_blank">CVE-2016-8461</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission. Product: Android. Versions: Kernel-3.10. Android ID: A-31668540. References: N-CVE-2016-8460.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8460" target="_blank">CVE-2016-8460</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">Possible buffer overflow in storage subsystem. Bad parameters as part of listener responses to RPMB commands could lead to buffer overflow. Product: Android. Versions: Kernel 3.18. Android ID: A-32577972. References: QC-CR#988462.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8459" target="_blank">CVE-2016-8459</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in the Qualcomm FUSE file system could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30786860. References: QC-CR#586855.</td><td style="text-align: center;" align="center">2017-01-12</td><td>not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8463" target="_blank">CVE-2016-8463</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the bootloader could enable a local attacker to execute arbitrary modem commands on the device. This issue is rated as High because it is a local permanent denial of service (device interoperability: completely permanent or requiring re-flashing the entire operating system). Product: Android. Versions: N/A. Android ID: A-30308784.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8467" target="_blank">CVE-2016-8467</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the MediaTek driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31531758. References: MT-ALPS02961384.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8472" target="_blank">CVE-2016-8472</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the MediaTek driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31528890. References: MT-ALPS02961380.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8471" target="_blank">CVE-2016-8471</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the MediaTek driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31528889. References: MT-ALPS02961395.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8470" target="_blank">CVE-2016-8470</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the camera driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31351206. References: N-CVE-2016-8469.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8469" target="_blank">CVE-2016-8469</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in core networking could enable a remote attacker to use specially crafted network packet to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31850211.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0389" target="_blank">CVE-2017-0389</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31796940.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8406&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8406" target="_blank">CVE-2016-8406</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-31222873. References: N-CVE-2016-6775.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6775&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6775" target="_blank">CVE-2016-6775</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Wi-Fi could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31856351.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6772" target="_blank">CVE-2016-6772</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the Framework API could enable a local malicious application to access system functions beyond its access level. This issue is rated as Moderate because it is a local bypass of restrictions on a constrained process. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-30202228.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6770&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6770" target="_blank">CVE-2016-6770</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Smart Lock could enable a local malicious user to access Smart Lock settings without a PIN. This issue is rated as Moderate because it first requires physical access to an unlocked device where Smart Lock was the last settings pane accessed by the user. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1. Android ID: A-29055171.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6769" target="_blank">CVE-2016-6769</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-31680980. References: N-CVE-2016-6776.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6776&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6776" target="_blank">CVE-2016-6776</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-31910462. References: N-CVE-2016-6777.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6777&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6777" target="_blank">CVE-2016-6777</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the HTC sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31251496.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6780&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6780" target="_blank">CVE-2016-6780</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the HTC sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31386004.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6779&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6779" target="_blank">CVE-2016-6779</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the HTC sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31384646.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6778&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6778" target="_blank">CVE-2016-6778</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A remote code execution vulnerability in the Framesequence library could enable an attacker using a specially crafted file to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses the Framesequence library. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31631842.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6768&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6768" target="_blank">CVE-2016-6768</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4. Android ID: A-31833604.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6767&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6767" target="_blank">CVE-2016-6767</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the libziparchive library could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31251826.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6762&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6762" target="_blank">CVE-2016-6762</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Qualcomm media codecs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29617572. References: QC-CR#1055783.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6760&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6760" target="_blank">CVE-2016-6760</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Qualcomm media codecs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29982686. References: QC-CR#1055766.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6759&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6759" target="_blank">CVE-2016-6759</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Qualcomm media codecs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30148882. References: QC-CR#1071731.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6758&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6758" target="_blank">CVE-2016-6758</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in Telephony could enable a local malicious application to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of local permanent denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31530456.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6763&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6763" target="_blank">CVE-2016-6763</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31681434.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6764&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6764" target="_blank">CVE-2016-6764</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in libmedia and libstagefright in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31318219.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6766&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6766" target="_blank">CVE-2016-6766</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission. Product: Android. Versions: Kernel-3.10. Android ID: A-31385953. References: N-CVE-2016-8397.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8397&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8397" target="_blank">CVE-2016-8397</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">A denial of service vulnerability in libstagefright in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 7.0. Android ID: A-31449945.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6765&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6765" target="_blank">CVE-2016-6765</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31095175. References: MT-ALPS02943455.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6781&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6781" target="_blank">CVE-2016-6781</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the ih264d decoder in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 6.0, 6.0.1, 7.0. Android ID: A-30481714.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6773" target="_blank">CVE-2016-6773</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An issue was discovered on BLU R1 HD devices with Shanghai Adups software. The two package names involved in the exfiltration are com.adups.fota and com.adups.fota.sysoper. In the com.adups.fota.sysoper app's AndroidManifest.xml file, it sets the android:sharedUserId attribute to a value of android.uid.system which makes it execute as the system user, which is a very privileged user on the device. Therefore, the app executing as the system user has been granted a number of powerful permissions even though they are not present in the com.adups.fota.sysoper app's AndroidManifest.xml file. This app provides the com.adups.fota app access to the user's call log, text messages, and various device identifiers through the com.adups.fota.sysoper.provider.InfoProvider component. The com.adups.fota app uses timestamps when it runs and is eligible to exfiltrate the user's PII every 72 hours. If 72 hours have passed since the value of the timestamp, then the exfiltration will be triggered by the user plugging in the device to charge or when they leave or enter a wireless network. The exfiltration occurs in the background without any user interaction.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10139" target="_blank">CVE-2016-10139</a><br><a href="https://www.kryptowire.com/adups_security_analysis.html" target="_blank">MISC</a><br><a href="https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA libomx library (libnvomx) could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: Kernel-3.18. Android ID: A-31251628. References: N-CVE-2016-6790.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6790&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6790" target="_blank">CVE-2016-6790</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An issue was discovered on BLU Advance 5.0 and BLU R1 HD devices with Shanghai Adups software. The com.adups.fota.sysoper app is installed as a system app and cannot be disabled by the user. In the com.adups.fota.sysoper app's AndroidManifest.xml file, it sets the android:sharedUserId attribute to a value of android.uid.system which makes it execute as the system user, which is a very privileged user on the device. The app has an exported broadcast receiver named com.adups.fota.sysoper.WriteCommandReceiver which any app on the device can interact with. Therefore, any app can send a command embedded in an intent which will be executed by the WriteCommandReceiver component which is executing as the system user. The third-party app, utilizing the WriteCommandReceiver, can perform the following actions: call a phone number, factory reset the device, take pictures of the screen, record the screen in a video, install applications, inject events, obtain the Android log, and others. In addition, the com.adups.fota.sysoper.TaskService component will make a request to a URL of http://rebootv5.adsunflower.com/ps/fetch.do where the commands in the String array with a key of sf in the JSON Object sent back by the server will be executed as the system user. Since the connection is made via HTTP, it is vulnerable to a MITM attack.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10138" target="_blank">CVE-2016-10138</a><br><a href="https://www.kryptowire.com/adups_security_analysis.html" target="_blank">MISC</a><br><a href="https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31224389. References: MT-ALPS02943506.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6782&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6782" target="_blank">CVE-2016-6782</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An issue was discovered on BLU R1 HD devices with Shanghai Adups software. The content provider named com.adups.fota.sysoper.provider.InfoProvider in the app with a package name of com.adups.fota.sysoper allows any app on the device to read, write, and delete files as the system user. In the com.adups.fota.sysoper app's AndroidManifest.xml file, it sets the android:sharedUserId attribute to a value of android.uid.system which makes it execute as the system user, which is a very privileged user on the device. This allows a third-party app to read, write, and delete the user's sent and received text messages and call log. This allows a third-party app to obtain PII from the user without permission to do so.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10137" target="_blank">CVE-2016-10137</a><br><a href="https://www.kryptowire.com/adups_security_analysis.html" target="_blank">MISC</a><br><a href="https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An information disclosure vulnerability in the MediaTek video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission. Product: Android. Versions: N/A. Android ID: A-31249105.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8396" target="_blank">CVE-2016-8396</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An issue was discovered on BLU R1 HD devices with Shanghai Adups software. The content provider named com.adups.fota.sysoper.provider.InfoProvider in the app with a package name of com.adups.fota.sysoper allows any app on the device to read, write, and delete files as the system user. In the com.adups.fota.sysoper app's AndroidManifest.xml file, it sets the android:sharedUserId attribute to a value of android.uid.system which makes it execute as the system user, which is a very privileged user on the device. This allows a third-party app to read, write, and delete files owned by the system user. The third-party app can modify the /data/system/users/0/settings_secure.xml file to add an app as a notification listener to be able to receive the text of notifications as they are received on the device. This also allows the /data/system/users/0/accounts.db to be read which contains authentication tokens for various accounts on the device. The third-party app can obtain privileged information and also modify files to obtain more privileges on the device.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10136" target="_blank">CVE-2016-10136</a><br><a href="https://www.kryptowire.com/adups_security_analysis.html" target="_blank">MISC</a><br><a href="https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31748056. References: MT-ALPS02961400.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6785&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6785" target="_blank">CVE-2016-6785</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the NVIDIA libomx library (libnvomx) could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: Kernel-3.18. Android ID: A-31251973. References: N-CVE-2016-6789.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6789&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6789" target="_blank">CVE-2016-6789</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the MediaTek I2C driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31224428. References: MT-ALPS02943467.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6788" target="_blank">CVE-2016-6788</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google -- android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31350044. References: MT-ALPS02943437.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6783&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6783" target="_blank">CVE-2016-6783</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google --android<br> </td><td style="text-align: left;" align="left">An elevation of privilege vulnerability in Qualcomm media codecs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29421682. References: QC-CR#1055792.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6761&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6761" target="_blank">CVE-2016-6761</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">google --android<br> </td><td style="text-align: left;" align="left">Possible buffer overflow in SMMU system call. Improper input validation in ADSP SID2CB system call may result in hypervisor memory overwrite. Product: Android. Versions: Kernel 3.18. Android ID: A-31625306. References: QC-CR#1036747.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8440" target="_blank">CVE-2016-8440</a><br><a href="https://source.android.com/security/bulletin/2017-01-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gstreamer -- gstreamer<br> </td><td style="text-align: left;" align="left">Off-by-one error in the gst_h264_parse_set_caps function in GStreamer before 1.10.2 allows remote attackers to have unspecified impact via a crafted file, which triggers an out-of-bounds read.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9809" target="_blank">CVE-2016-9809</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/01/2" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/05/8" target="_blank">MLIST</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=774896" target="_blank">CONFIRM</a><br><a href="https://gstreamer.freedesktop.org/releases/1.10/#1.10.2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gstreamer -- gstreamer<br> </td><td style="text-align: left;" align="left">The FLIC decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via a crafted series of skip and count pairs.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9808" target="_blank">CVE-2016-9808</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/01/2" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/05/8" target="_blank">MLIST</a><br><a href="https://gstreamer.freedesktop.org/releases/1.10/#1.10.2" target="_blank">CONFIRM</a><br><a href="https://scarybeastsecurity.blogspot.com/2016/11/0day-poc-incorrect-fix-for-gstreamer.html" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gstreamer -- gstreamer<br> </td><td style="text-align: left;" align="left">The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE is set to always-malloc, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ico file.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9811" target="_blank">CVE-2016-9811</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/01/2" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/05/8" target="_blank">MLIST</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=774902" target="_blank">CONFIRM</a><br><a href="https://gstreamer.freedesktop.org/releases/1.10/#1.10.2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gstreamer -- gstreamer<br> </td><td style="text-align: left;" align="left">The flx_decode_chunks function in gst/flx/gstflxdec.c in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted FLIC file.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9807" target="_blank">CVE-2016-9807</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/01/2" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/05/8" target="_blank">MLIST</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=774859" target="_blank">CONFIRM</a><br><a href="https://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=153a8ae752c90d07190ef45803422a4f71ea8bff" target="_blank">CONFIRM</a><br><a href="https://gstreamer.freedesktop.org/releases/1.10/#1.10.2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gstreamer -- gstreamer<br> </td><td style="text-align: left;" align="left">The _parse_pat function in the mpegts parser in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9813" target="_blank">CVE-2016-9813</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/01/2" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/05/8" target="_blank">MLIST</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=775120" target="_blank">CONFIRM</a><br><a href="https://gstreamer.freedesktop.org/releases/1.10/#1.10.2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gstreamer -- gstreamer<br> </td><td style="text-align: left;" align="left">The gst_mpegts_section_new function in the mpegts decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a too small section.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9812" target="_blank">CVE-2016-9812</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/01/2" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/05/8" target="_blank">MLIST</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=775048" target="_blank">CONFIRM</a><br><a href="https://gstreamer.freedesktop.org/releases/1.10/#1.10.2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">gstreamer -- gstreamer<br> </td><td style="text-align: left;" align="left">The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9810" target="_blank">CVE-2016-9810</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/01/2" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/05/8" target="_blank">MLIST</a><br><a href="https://bugzilla.gnome.org/show_bug.cgi?id=774897" target="_blank">CONFIRM</a><br><a href="https://gstreamer.freedesktop.org/releases/1.10/#1.10.2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ipv6 -- ipv6<br> </td><td style="text-align: left;" align="left">An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perform any type of fragmentation-based attack against legacy IPv6 nodes that do not implement [RFC6946]. That is, employing fragmentation where not actually needed allows for fragmentation-based attack vectors to be employed, unnecessarily. We note that, unfortunately, even nodes that already implement [RFC6946] can be subject to DoS attacks as a result of the generation of IPv6 atomic fragments. Let us assume that Host A is communicating with Host B and that, as a result of the widespread dropping of IPv6 packets that contain extension headers (including fragmentation) [RFC7872], some intermediate node filters fragments between Host B and Host A. If an attacker sends a forged ICMPv6 PTB error message to Host B, reporting an MTU smaller than 1280, this will trigger the generation of IPv6 atomic fragments from that moment on (as required by [RFC2460]). When Host B starts sending IPv6 atomic fragments (in response to the received ICMPv6 PTB error message), these packets will be dropped, since we previously noted that IPv6 packets with extension headers were being dropped between Host B and Host A. Thus, this situation will result in a DoS scenario. Another possible scenario is that in which two BGP peers are employing IPv6 transport and they implement Access Control Lists (ACLs) to drop IPv6 fragments (to avoid control-plane attacks). If the aforementioned BGP peers drop IPv6 fragments but still honor received ICMPv6 PTB error messages, an attacker could easily attack the corresponding peering session by simply sending an ICMPv6 PTB message with a reported MTU smaller than 1280 bytes. Once the attack packet has been sent, the aforementioned routers will themselves be the ones dropping their own traffic.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10142" target="_blank">CVE-2016-10142</a><br><a href="https://tools.ietf.org/html/draft-ietf-6man-deprecate-atomfrag-generation-08" target="_blank">MISC</a><br><a href="https://tools.ietf.org/html/rfc8021" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">jasper -- jasper<br> </td><td style="text-align: left;" align="left">The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8883" target="_blank">CVE-2016-8883</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/17/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/23/8" target="_blank">MLIST</a><br><a href="https://github.com/mdadams/jasper/issues/32" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">jasper -- jasper<br> </td><td style="text-align: left;" align="left">The jpc_dec_tilefini function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8882" target="_blank">CVE-2016-8882</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/17/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/23/8" target="_blank">MLIST</a><br><a href="https://github.com/mdadams/jasper/issues/30" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">jenkins -- jenkins<br> </td><td style="text-align: left;" align="left">The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9299" target="_blank">CVE-2016-9299</a><br><a href="http://www.openwall.com/lists/oss-security/2016/11/12/4" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/11/14/9" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/94281" target="_blank">BID</a><br><a href="http://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-edition" target="_blank">MISC</a><br><a href="https://groups.google.com/forum/#!original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ" target="_blank">MLIST</a><br><a href="https://groups.google.com/forum/#!original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ" target="_blank">MLIST</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW2KUKYLNLVDB7STLHLYALCUFLEGCRM6/" target="_blank">FEDORA</a><br><a href="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-11-16" target="_blank">CONFIRM</a><br><a href="https://www.cloudbees.com/jenkins-security-advisory-2016-11-16" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">lenovo -- xclarity_administrator<br> </td><td style="text-align: left;" align="left">Privilege Escalation in Lenovo XClarity Administrator earlier than 1.2.0, if LXCA is used to manage rack switches or chassis with embedded input/output modules (IOMs), certain log files viewable by authenticated users may contain passwords for internal administrative LXCA accounts with temporary passwords that are used internally by LXCA code.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8221" target="_blank">CVE-2016-8221</a><br><a href="https://support.lenovo.com/us/en/product_security/LEN_10605" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">lg -- mtklogger<br> </td><td style="text-align: left;" align="left">An issue was discovered on LG devices using the MTK chipset with L(5.0/5.1), M(6.0/6.0.1), and N(7.0) software, and RCA Voyager Tablet, BLU Advance 5.0, and BLU R1 HD devices. The MTKLogger app with a package name of com.mediatek.mtklogger has application components that are accessible to any application that resides on the device. Namely, the com.mediatek.mtklogger.framework.LogReceiver and com.mediatek.mtklogger.framework.MTKLoggerService application components are exported since they contain an intent filter, are not protected by a custom permission, and do not explicitly set the android:exported attribute to false. Therefore, these components are exported by default and are thus accessible to any third party application by using android.content.Intent object for communication. These application components can be used to start and stop the logs using Intent objects with embedded data. The available logs are the GPS log, modem log, network log, and mobile log. The base directory that contains the directories for the 4 types of logs is /sdcard/mtklog which makes them accessible to apps that require the READ_EXTERNAL_STORAGE permission. The GPS log contains the GPS coordinates of the user as well as a timestamp for the coordinates. The modem log contains AT commands and their parameters which allow the user's outgoing and incoming calls and text messages to be obtained. The network log is a tcpdump network capture. The mobile log contains the Android log, which is not available to third-party apps as of Android 4.1. The LG ID is LVE-SMP-160019.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10135" target="_blank">CVE-2016-10135</a><br><a href="https://lgsecurity.lge.com/security_updates.html" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">libbsd -- libbsd<br> </td><td style="text-align: left;" align="left">Off-by-one vulnerability in the fgetwln function in libbsd before 0.8.2 allows attackers to have unspecified impact via unknown vectors, which trigger a heap-based buffer overflow.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2090" target="_blank">CVE-2016-2090</a><br><a href="http://www.openwall.com/lists/oss-security/2016/01/28/5" target="_blank">MLIST</a><br><a href="https://blog.fuzzing-project.org/36-Heap-buffer-overflow-in-fgetwln-function-of-libbsd.html" target="_blank">MISC</a><br><a href="https://bugs.freedesktop.org/show_bug.cgi?id=93881" target="_blank">CONFIRM</a><br><a href="https://cgit.freedesktop.org/libbsd/commit/?id=c8f0723d2b4520bdd6b9eb7c3e7976de726d7ff7" target="_blank">CONFIRM</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KJE5SPSX7HEKLZ34LUTZLXWPEL2K353/" target="_blank">FEDORA</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIQKQ42Z7553D46QY3IMIQKS52QTNIHY/" target="_blank">FEDORA</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">liferay -- portal<br> </td><td style="text-align: left;" align="left">Liferay Portal through 6.2.10 allows remote authenticated users to execute arbitrary shell commands via a crafted Velocity template.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5327" target="_blank">CVE-2010-5327</a><br><a href="https://dev.liferay.com/web/community-security-team/known-vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://dev.liferay.com/web/community-security-team/known-vulnerabilities/-/asset_publisher/4AHAYapUm8Xc/content/lps-64547-remote-code-execution-and-privilege-escalation-in-templates" target="_blank">CONFIRM</a><br><a href="https://github.com/liferay/liferay-portal/commit/90c4e85a8f8135f069f3f05e4d54a77704769f91" target="_blank">CONFIRM</a><br><a href="https://issues.liferay.com/browse/LPE-14964" target="_blank">CONFIRM</a><br><a href="https://issues.liferay.com/browse/LPS-64547" target="_blank">CONFIRM</a><br><a href="https://issues.liferay.com/browse/LPS-7087" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel<br> </td><td style="text-align: left;" align="left">arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2584" target="_blank">CVE-2017-2584</a><br><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74d" target="_blank">CONFIRM</a><br><a href="http://www.openwall.com/lists/oss-security/2017/01/13/7" target="_blank">MLIST</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1413001" target="_blank">CONFIRM</a><br><a href="https://github.com/torvalds/linux/commit/129a72a0d3c8e139a04512325384fe5ac119e74d" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel<br> </td><td style="text-align: left;" align="left">The MT6573FDVT_SetRegHW function in camera_fdvt.c in the MediaTek driver for Linux allows local users to gain privileges via a crafted application that makes an MT6573FDVTIOC_T_SET_FDCONF_CMD IOCTL call.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6492" target="_blank">CVE-2016-6492</a><br><a href="http://packetstormsecurity.com/files/138113/MediaTek-Driver-Privilege-Escalation.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/539058/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="http://www.securityfocus.com/bid/92207" target="_blank">BID</a><br><a href="https://source.android.com/security/bulletin/2016-12-01.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel<br> </td><td style="text-align: left;" align="left">Cross-site request forgery (CSRF) vulnerability in ntopng through 2.4 allows remote attackers to hijack the authentication of arbitrary users, as demonstrated by admin/add_user.lua, admin/change_user_prefs.lua, admin/delete_user.lua, and admin/password_reset.lua.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5473" target="_blank">CVE-2017-5473</a><br><a href="https://github.com/ntop/ntopng/commit/1b2ceac8f578a246af6351c4f476e3102cdf21b3" target="_blank">CONFIRM</a><br><a href="https://github.com/ntop/ntopng/commit/f91fbe3d94c8346884271838ae3406ae633f6f15" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">matrixssl -- matrixssl<br> </td><td style="text-align: left;" align="left">The pstm_reverse function in MatrixSSL before 3.8.4 allows remote attackers to cause a denial of service (invalid memory read and crash) via a (1) zero value or (2) the key's modulus for the secret key during RSA key exchange.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6886" target="_blank">CVE-2016-6886</a><br><a href="http://www.matrixssl.org/blog/releases/matrixssl_3_8_4" target="_blank">CONFIRM</a><br><a href="https://blog.fuzzing-project.org/51-Fun-with-Bignums-Crashing-MatrixSSL-and-more.html" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">matrixssl -- matrixssl<br> </td><td style="text-align: left;" align="left">The pstm_exptmod function in MatrixSSL 3.8.6 and earlier does not properly perform modular expontiation, which might allow remote attackers to predict the secret key via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6887.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8671" target="_blank">CVE-2016-8671</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/15/2" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/10/15/8" target="_blank">MLIST</a><br><a href="https://blog.fuzzing-project.org/54-Update-on-MatrixSSL-miscalculation-CVE-2016-8671,-incomplete-fix-for-CVE-2016-6887.html" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">matrixssl -- matrixssl<br> </td><td style="text-align: left;" align="left">The pstm_exptmod function in MatrixSSL 3.8.6 and earlier does not properly perform modular expontiation, which might allow remote attackers to predict the secret key via a CRT attack.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6887" target="_blank">CVE-2016-6887</a><br><a href="http://www.matrixssl.org/blog/releases/matrixssl_3_8_4" target="_blank">CONFIRM</a><br><a href="https://blog.fuzzing-project.org/51-Fun-with-Bignums-Crashing-MatrixSSL-and-more.html" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">matrixssl -- matrixssl<br> </td><td style="text-align: left;" align="left">The pstm_exptmod function in MatrixSSL before 3.8.4 allows remote attackers to cause a denial of service (invalid free and crash) via a base zero value for the modular exponentiation.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6885" target="_blank">CVE-2016-6885</a><br><a href="http://www.matrixssl.org/blog/releases/matrixssl_3_8_4" target="_blank">CONFIRM</a><br><a href="https://blog.fuzzing-project.org/51-Fun-with-Bignums-Crashing-MatrixSSL-and-more.html" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp<br> </td><td style="text-align: left;" align="left">ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9311" target="_blank">CVE-2016-9311</a><br><a href="http://nwtime.org/ntp428p9_release/" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/NtpBug3119" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://www.kb.cert.org/vuls/id/633847" target="_blank">CERT-VN</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp<br> </td><td style="text-align: left;" align="left">NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7429" target="_blank">CVE-2016-7429</a><br><a href="http://nwtime.org/ntp428p9_release/" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/NtpBug3072" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://www.kb.cert.org/vuls/id/633847" target="_blank">CERT-VN</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp<br> </td><td style="text-align: left;" align="left">NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7431" target="_blank">CVE-2016-7431</a><br><a href="http://nwtime.org/ntp428p9_release/" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/NtpBug3102" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://www.kb.cert.org/vuls/id/633847" target="_blank">CERT-VN</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp<br> </td><td style="text-align: left;" align="left">NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a "root distance that did not include the peer dispersion."</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7433" target="_blank">CVE-2016-7433</a><br><a href="http://nwtime.org/ntp428p9_release/" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/NtpBug3067" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://www.kb.cert.org/vuls/id/633847" target="_blank">CERT-VN</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp<br> </td><td style="text-align: left;" align="left">The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7434" target="_blank">CVE-2016-7434</a><br><a href="http://nwtime.org/ntp428p9_release/" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/NtpBug3082" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://www.kb.cert.org/vuls/id/633847" target="_blank">CERT-VN</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp<br> </td><td style="text-align: left;" align="left">ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7428" target="_blank">CVE-2016-7428</a><br><a href="http://nwtime.org/ntp428p9_release/" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/NtpBug3113" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://www.kb.cert.org/vuls/id/633847" target="_blank">CERT-VN</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp<br> </td><td style="text-align: left;" align="left">The broadcast mode replay prevention functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via a crafted broadcast mode packet.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7427" target="_blank">CVE-2016-7427</a><br><a href="http://nwtime.org/ntp428p9_release/" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/NtpBug3114" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://www.kb.cert.org/vuls/id/633847" target="_blank">CERT-VN</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp<br> </td><td style="text-align: left;" align="left">The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9310" target="_blank">CVE-2016-9310</a><br><a href="http://nwtime.org/ntp428p9_release/" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/NtpBug3118" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://www.kb.cert.org/vuls/id/633847" target="_blank">CERT-VN</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp<br> </td><td style="text-align: left;" align="left">ntpd in NTP before 4.2.8p9, when running on Windows, allows remote attackers to cause a denial of service via a large UDP packet.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9312" target="_blank">CVE-2016-9312</a><br><a href="http://nwtime.org/ntp428p9_release/" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/NtpBug3110" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://www.kb.cert.org/vuls/id/633847" target="_blank">CERT-VN</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">ntp -- ntp<br> </td><td style="text-align: left;" align="left">NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.</td><td style="text-align: center;" align="center">2017-01-13</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7426" target="_blank">CVE-2016-7426</a><br><a href="http://nwtime.org/ntp428p9_release/" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/NtpBug3071" target="_blank">CONFIRM</a><br><a href="http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" target="_blank">CONFIRM</a><br><a href="https://www.kb.cert.org/vuls/id/633847" target="_blank">CERT-VN</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">puppet_enterprise -- console<br> </td><td style="text-align: left;" align="left">Open redirect vulnerability in the Console in Puppet Enterprise before 2015.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the string parameter.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6501" target="_blank">CVE-2015-6501</a><br><a href="https://puppet.com/security/cve/CVE-2015-6501" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">puppet_enterprise -- console<br> </td><td style="text-align: left;" align="left">Open redirect vulnerability in the Console in Puppet Enterprise 2015.x and 2016.x before 2016.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the redirect parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6501.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5715" target="_blank">CVE-2016-5715</a><br><a href="http://hyp3rlinx.altervista.org/advisories/PUPPET-AUTHENTICATION-REDIRECT.txt" target="_blank">MISC</a><br><a href="http://packetstormsecurity.com/files/139302/Puppet-Enterprise-Web-Interface-Open-Redirect.html" target="_blank">MISC</a><br><a href="http://www.securityfocus.com/archive/1/archive/1/539618/100/0/threaded" target="_blank">BUGTRAQ</a><br><a href="http://www.securityfocus.com/bid/93846" target="_blank">BID</a><br><a href="https://puppet.com/security/cve/cve-2016-5715" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">serendipity -- serendipity<br> </td><td style="text-align: left;" align="left">Serendipity through 2.0.5 allows CSRF for the installation of an event plugin or a sidebar plugin.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5476" target="_blank">CVE-2017-5476</a><br><a href="https://github.com/s9y/Serendipity/issues/439" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">serendipity -- serendipity<br> </td><td style="text-align: left;" align="left">comment.php in Serendipity through 2.0.5 allows CSRF in deleting any comments.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5475" target="_blank">CVE-2017-5475</a><br><a href="https://github.com/s9y/Serendipity/issues/439" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">serendipity -- serendipity<br> </td><td style="text-align: left;" align="left">Open redirect vulnerability in comment.php in Serendipity through 2.0.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the HTTP Referer header.</td><td style="text-align: center;" align="center">2017-01-14</td><td>not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5474" target="_blank">CVE-2017-5474</a><br><a href="https://github.com/s9y/Serendipity/commit/6285933470bab2923e4573b5d54ba9a32629b0cd" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">smack -- smack<br> </td><td style="text-align: left;" align="left">Race condition in the XMPP library in Smack before 4.1.9, when the SecurityMode.required TLS setting has been set, allows man-in-the-middle attackers to bypass TLS protections and trigger use of cleartext for client authentication by stripping the "starttls" feature from a server response.</td><td style="text-align: center;" align="center">2017-01-12</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10027" target="_blank">CVE-2016-10027</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/22/12" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/95129" target="_blank">BID</a><br><a href="https://community.igniterealtime.org/blogs/ignite/2016/11/22/smack-security-advisory-2016-11-22" target="_blank">CONFIRM</a><br><a href="https://github.com/igniterealtime/Smack/commit/059ee99ba0d5ff7758829acf5a9aeede09ec820b" target="_blank">CONFIRM</a><br><a href="https://github.com/igniterealtime/Smack/commit/a9d5cd4a611f47123f9561bc5a81a4555fe7cb04" target="_blank">CONFIRM</a><br><a href="https://issues.igniterealtime.org/projects/SMACK/issues/SMACK-739" target="_blank">CONFIRM</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4WXAZ4JVJXHMEDDXJVWJHPVBF5QCTZF/" target="_blank">FEDORA</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">web2py -- web2py<br> </td><td style="text-align: left;" align="left">Web2py versions 2.14.5 and below was affected by Local File Inclusion vulnerability, which allows a malicious intended user to read/access web server sensitive files.</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4806&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4806" target="_blank">CVE-2016-4806</a><br><a href="http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html" target="_blank">MISC</a><br><a href="https://www.exploit-db.com/exploits/39821/" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">web2py -- web2py<br> </td><td style="text-align: left;" align="left">Web2py versions 2.14.5 and below was affected by CSRF (Cross Site Request Forgery) vulnerability, which allows an attacker to trick a logged in user to perform some unwanted actions i.e An attacker can trick an victim to disable the installed application just by sending a URL to victim.</td><td style="text-align: center;" align="center">2017-01-11</td><td style="text-align: center; width: 5%;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4808&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4808" target="_blank">CVE-2016-4808</a><br><a href="http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html" target="_blank">MISC</a><br><a href="https://www.exploit-db.com/exploits/39821/" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">wordpress -- wordpress<br> </td><td style="text-align: left;" align="left">Cross-site request forgery (CSRF) vulnerability in the widget-editing accessibility-mode feature in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims for requests that perform a widgets-access action, related to wp-admin/includes/class-wp-screen.php and wp-admin/widgets.php.</td><td style="text-align: center;" align="center">2017-01-14</td><td>not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5492" target="_blank">CVE-2017-5492</a><br><a href="http://www.openwall.com/lists/oss-security/2017/01/14/6" target="_blank">MLIST</a><br><a href="https://codex.wordpress.org/Version_4.7.1" target="_blank">CONFIRM</a><br><a href="https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733" target="_blank">CONFIRM</a><br><a href="https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">wordpress -- wordpress<br> </td><td style="text-align: left;" align="left">wp-includes/ms-functions.php in the Multisite WordPress API in WordPress before 4.7.1 does not properly choose random numbers for keys, which makes it easier for remote attackers to bypass intended access restrictions via a crafted (1) site signup or (2) user signup.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5493" target="_blank">CVE-2017-5493</a><br><a href="http://www.openwall.com/lists/oss-security/2017/01/14/6" target="_blank">MLIST</a><br><a href="https://codex.wordpress.org/Version_4.7.1" target="_blank">CONFIRM</a><br><a href="https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4" target="_blank">CONFIRM</a><br><a href="https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">wordpress -- wordpress<br> </td><td style="text-align: left;" align="left">wp-mail.php in WordPress before 4.7.1 might allow remote attackers to bypass intended posting restrictions via a spoofed mail server with the mail.example.com name.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5491" target="_blank">CVE-2017-5491</a><br><a href="http://www.openwall.com/lists/oss-security/2017/01/14/6" target="_blank">MLIST</a><br><a href="https://codex.wordpress.org/Version_4.7.1" target="_blank">CONFIRM</a><br><a href="https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a" target="_blank">CONFIRM</a><br><a href="https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">wordpress -- wordpress<br> </td><td style="text-align: left;" align="left">Cross-site request forgery (CSRF) vulnerability in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims via vectors involving a Flash file upload.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5489" target="_blank">CVE-2017-5489</a><br><a href="http://www.openwall.com/lists/oss-security/2017/01/14/6" target="_blank">MLIST</a><br><a href="https://codex.wordpress.org/Version_4.7.1" target="_blank">CONFIRM</a><br><a href="https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">wordpress -- wordpress<br> </td><td style="text-align: left;" align="left">wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5487" target="_blank">CVE-2017-5487</a><br><a href="http://www.openwall.com/lists/oss-security/2017/01/14/6" target="_blank">MLIST</a><br><a href="https://codex.wordpress.org/Version_4.7.1" target="_blank">CONFIRM</a><br><a href="https://github.com/WordPress/WordPress/commit/daf358983cc1ce0c77bf6d2de2ebbb43df2add60" target="_blank">CONFIRM</a><br><a href="https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/" target="_blank">CONFIRM</a><br><a href="https://www.wordfence.com/blog/2016/12/wordfence-blocks-username-harvesting-via-new-rest-api-wp-4-7/" target="_blank">MISC</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">wordpress -- wordpress<br> </td><td style="text-align: left;" align="left">Multiple cross-site scripting (XSS) vulnerabilities in wp-admin/update-core.php in WordPress before 4.7.1 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) version header of a plugin.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5488" target="_blank">CVE-2017-5488</a><br><a href="http://www.openwall.com/lists/oss-security/2017/01/14/6" target="_blank">MLIST</a><br><a href="https://codex.wordpress.org/Version_4.7.1" target="_blank">CONFIRM</a><br><a href="https://github.com/WordPress/WordPress/commit/c9ea1de1441bb3bda133bf72d513ca9de66566c2" target="_blank">CONFIRM</a><br><a href="https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-9ad8340aa9-vendor-product" style="text-align: left;" scope="row" align="left">wordpress -- wordpress<br> </td><td style="text-align: left;" align="left">Cross-site scripting (XSS) vulnerability in the theme-name fallback functionality in wp-includes/class-wp-theme.php in WordPress before 4.7.1 allows remote attackers to inject arbitrary web script or HTML via a crafted directory name of a theme, related to wp-admin/includes/class-theme-installer-skin.php.</td><td style="text-align: center;" align="center">2017-01-14</td><td style="text-align: center; width: 5%;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5490" target="_blank">CVE-2017-5490</a><br><a href="http://www.openwall.com/lists/oss-security/2017/01/14/6" target="_blank">MLIST</a><br><a href="https://codex.wordpress.org/Version_4.7.1" target="_blank">CONFIRM</a><br><a href="https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359" target="_blank">CONFIRM</a><br><a href="https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/" target="_blank">CONFIRM</a><br><a href="https://www.mehmetince.net/low-severity-wordpress/" target="_blank">MISC</a></td></tr></tbody></table><a href="https://www.us-cert.gov#top">Back to top</a></div><hr><p>This product is provided subject to this <a href="http://www.us-cert.gov/privacy/notification">Notification</a> and this <a href="http://www.us-cert.gov/privacy/">Privacy & Use</a> policy.</p></div></div><div id="ox-9ad8340aa9-mail_footer"><hr><table style="border-collapse: collapse; width: 100%;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #757575; font-size: 10px; font-family: Arial;" width="89%" height="60">A copy of this publication is available at <a href="https://www.us-cert.gov">www.us-cert.gov</a>. If you need help or have questions, please send an email to <a href="mailto:info@us-cert.gov">info@us-cert.gov</a>. Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT@ncas.us-cert.gov to your address book.</td></tr></tbody></table><table style="border-collapse: collapse; width: 400px;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #666666; font-family: Arial, sans-serif; font-size: 12px;" valign="bottom" height="24">OTHER RESOURCES:</td></tr><tr><td style="padding: 0px; color: #666666; font-family: Arial, sans-serif; font-size: 12px;" valign="middle" height="24"><a href="http://www.us-cert.gov/contact-us/" target="_blank">Contact Us</a> | <a href="http://www.us-cert.gov/security-publications" target="_blank">Security Publications</a> | <a href="http://www.us-cert.gov/ncas" target="_blank">Alerts and Tips</a> | <a href="http://www.us-cert.gov/related-resources" target="_blank">Related Resources</a></td></tr></tbody></table><table style="border-collapse: collapse; width: 150px;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #666666; font-family: Arial, sans-serif; font-size: 12px;" colspan="7" valign="bottom" height="24">STAY CONNECTED:</td></tr><tr><td width="41" style="padding: 0px;"><a href="http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new"><img src="https://service.govdelivery.com/banners/GOVDELIVERY/SOCIAL_MEDIA/envelope.gif" border="0" alt="Sign up for email updates" width="25" height="25" style="width: 25px; height: 25px;"></a></td></tr></tbody></table><p style="color: #666666; font-family: Arial, sans-serif; font-size: 12px;">SUBSCRIBER SERVICES:<br><a href="http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true" target="_blank">Manage Preferences</a>  |  <a href="https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.b03cc84c90ac58ffb6e970add416fb2d&destination=w3hwn%40arrl.net" target="_blank">Unsubscribe</a>  |  <a href="https://subscriberhelp.govdelivery.com/">Help</a></p></div><div id="ox-9ad8340aa9-tagline"><hr><table style="border-collapse: collapse; width: 100%;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #757575; font-size: 10px; font-family: Arial;" width="89%">This email was sent to w3hwn@arrl.net using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870</td><td align="right" width="11%" style="padding: 0px;"><a href="http://www.govdelivery.com/portals/powered-by" target="_blank"><img src="https://service.govdelivery.com/banners/GOVDELIVERY/logo_gd_poweredby.gif" border="0" alt="Powered by GovDelivery" width="115" height="35" style="width: 115px; height: 35px;"></a></td></tr></tbody></table></div></td></tr></tbody></table></blockquote></body></html>