<!DOCTYPE html>
<html><head>
    <meta charset="UTF-8">
</head><body><p><br></p><table width="700" border="0" cellspacing="0" cellpadding="0" align="center" style="border-collapse: collapse;" class="mce-item-table"><tbody><tr><td style="padding: 0px;"><p><img src="http://content.govdelivery.com/attachments/fancy_images/USDHSUSCERT/2015/11/675988/us-cert-banner-700x100-2_original.png" alt="U.S. Department of Homeland Security US-CERT" width="700" height="100" style="width: 700px; height: 100px;"></p><p>National Cyber Awareness System:</p><p> </p><div class="ox-984aebe323-rss_item" style="margin-bottom: 2em;"><div class="ox-984aebe323-rss_title" style="font-weight: bold; font-size: 120%; margin: 0 0 0.3em; padding: 0;"><a href="https://www.us-cert.gov/ncas/bulletins/SB17-058">SB17-058: Vulnerability Summary for the Week of February 20, 2017</a></div><div class="ox-984aebe323-rss_pub_date" style="font-size: 90%; font-style: italic; color: #666666; margin: 0 0 0.3em; padding: 0;">02/27/2017 08:19 AM EST</div><br><div class="ox-984aebe323-rss_description" style="margin: 0 0 0.3em; padding: 0;">Original release date: February 27, 2017 <br><p>The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the <a href="http://www.nist.gov">National Institute of Standards and Technology</a> (NIST) <a href="http://nvd.nist.gov">National Vulnerability Database</a> (NVD) in the past week. The NVD is sponsored by the <a href="http://www.dhs.gov">Department of Homeland Security</a> (DHS) <a href="https://www.us-cert.gov/nccic">National Cybersecurity and Communications Integration Center</a> (NCCIC) / <a href="https://www.us-cert.gov">United States Computer Emergency Readiness Team</a> (US-CERT). For modified or updated entries, please visit the <a href="http://nvd.nist.gov" target="_blank">NVD</a>, which contains historical vulnerability information.</p><p>The vulnerabilities are based on the <a href="http://cve.mitre.org/" target="_blank">CVE</a> vulnerability naming standard and are organized according to severity, determined by the <a href="http://nvd.nist.gov/cvss.cfm" target="_blank">Common Vulnerability Scoring System</a> (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:</p><ul><li><p><strong><a href="#high">High</a></strong> - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0</p></li><li><p><strong><a href="#medium">Medium</a></strong> - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9</p></li><li><p><strong><a href="#low">Low</a></strong> - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9</p></li></ul><p>Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.</p><p><a id="ox-984aebe323-high" name="high" class="mce-item-anchor"></a> </p><h2 id="ox-984aebe323-high_v_title">High Vulnerabilities</h2><table border="1" summary="High Vulnerabilities" align="center"><thead><tr><th class="ox-984aebe323-vendor-product" style="width: 24%;" scope="col">Primary<br>Vendor -- Product</th><th style="width: 44%;" scope="col">Description</th><th style="width: 8%;" scope="col">Published</th><th style="width: 4%;" scope="col">CVSS Score</th><th style="width: 10%;" scope="col">Source & Patch Info</th></tr></thead><tbody><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">aerospike -- database_server</td><td style="text-align: left;" align="left">An exploitable out-of-bounds write vulnerability exists in the batch transaction field parsing functionality of Aerospike Database Server 3.10.0.3. A specially crafted packet can cause an out-of-bounds write resulting in memory corruption which can lead to remote code execution. An attacker can simply connect to the port to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9051&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9051" target="_blank">CVE-2016-9051</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0265/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">aerospike -- database_server</td><td style="text-align: left;" align="left">An exploitable out-of-bounds indexing vulnerability exists within the RW fabric message particle type of Aerospike Database Server 3.10.0.3. A specially crafted packet can cause the server to fetch a function table outside the bounds of an array resulting in remote code execution. An attacker can simply connect to the port to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9053&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9053" target="_blank">CVE-2016-9053</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0267/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "WebSheet" component, which allows attackers to bypass a sandbox protection mechanism via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7630&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7630" target="_blank">CVE-2016-7630</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "AppleGraphicsControl" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4662&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4662" target="_blank">CVE-2016-4662</a><br><a href="http://www.securityfocus.com/bid/93852" target="_blank">BID</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Kernel" component. It allows local users to execute arbitrary code in a privileged context or cause a denial of service (MIG code mishandling and system crash) via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4669&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4669" target="_blank">CVE-2016-4669</a><br><a href="http://www.securityfocus.com/bid/93849" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) via a crafted PDF file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4671&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4671" target="_blank">CVE-2016-4671</a><br><a href="http://www.securityfocus.com/bid/93852" target="_blank">BID</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "libxpc" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4675&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4675" target="_blank">CVE-2016-4675</a><br><a href="http://www.securityfocus.com/bid/93849" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "Thunderbolt" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4780&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4780" target="_blank">CVE-2016-4780</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7582&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7582" target="_blank">CVE-2016-7582</a><br><a href="http://www.securityfocus.com/bid/94435" target="_blank">BID</a><br><a href="https://support.apple.com/HT207170" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "Bluetooth" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7596&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7596" target="_blank">CVE-2016-7596</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7602&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7602" target="_blank">CVE-2016-7602</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app that leverages object-lifetime mishandling during process spawning.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7613&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7613" target="_blank">CVE-2016-7613</a><br><a href="http://www.securityfocus.com/bid/94116" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "Bluetooth" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (type confusion) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7617&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7617" target="_blank">CVE-2016-7617</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "kext tools" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7629&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7629" target="_blank">CVE-2016-7629</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "Directory Services" component. It allows local users to gain privileges or cause a denial of service (use-after-free) via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7633&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7633" target="_blank">CVE-2016-7633</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. The issue involves the "Power Management" component. It allows local users to gain privileges via unspecified vectors related to Mach port name references.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7661&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7661" target="_blank">CVE-2016-7661</a><br><a href="http://www.securityfocus.com/bid/94906" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.3 is affected. The issue involves the "Bluetooth" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2353&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2353" target="_blank">CVE-2017-2353</a><br><a href="http://www.securityfocus.com/bid/95723" target="_blank">BID</a><br><a href="https://support.apple.com/HT207483" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.3 is affected. The issue involves the "Graphics Drivers" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2358&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2358" target="_blank">CVE-2017-2358</a><br><a href="http://www.securityfocus.com/bid/95723" target="_blank">BID</a><br><a href="https://support.apple.com/HT207483" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "IOHIDFamily" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7591&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7591" target="_blank">CVE-2016-7591</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7606&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7606" target="_blank">CVE-2016-7606</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7612&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7612" target="_blank">CVE-2016-7612</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Disk Images" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7616&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7616" target="_blank">CVE-2016-7616</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows local users to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7621&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7621" target="_blank">CVE-2016-7621</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7637&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7637" target="_blank">CVE-2016-7637</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7644&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7644" target="_blank">CVE-2016-7644</a><br><a href="http://www.securityfocus.com/bid/94904" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "syslog" component. It allows local users to gain privileges via unspecified vectors related to Mach port name references.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7660&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7660" target="_blank">CVE-2016-7660</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "CoreFoundation" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted string.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7663&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7663" target="_blank">CVE-2016-7663</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2360&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2360" target="_blank">CVE-2017-2360</a><br><a href="http://www.securityfocus.com/bid/95729" target="_blank">BID</a><br><a href="http://www.securityfocus.com/bid/95731" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207483" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2370&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2370" target="_blank">CVE-2017-2370</a><br><a href="http://www.securityfocus.com/bid/95731" target="_blank">BID</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1004" target="_blank">MISC</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207483" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cmsmadesimple -- form_builder</td><td style="text-align: left;" align="left">CMS Made Simple version 1.x Form Builder before version 0.8.1.6 allows remote attackers to execute PHP code via the cntnt01fbrp_forma_form_template parameter in admin_store_form.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6070&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6070" target="_blank">CVE-2017-6070</a><br><a href="http://dev.cmsmadesimple.org/project/files/69" target="_blank">MISC</a><br><a href="https://daylight-it.com/security-advisory-dlcs0001.html" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">dell -- sonicwall_secure_remote_access_server</td><td style="text-align: left;" align="left">The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn't properly escape the information passed in the 'tsrDeleteRestartedFile' or 'currentTSREmailTo' variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9682&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9682" target="_blank">CVE-2016-9682</a><br><a href="http://documents.software.dell.com/sonicwall-sma-100-series/8.1.0.7/release-notes/resolved-issues?ParentProduct=868" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">dell -- sonicwall_secure_remote_access_server</td><td style="text-align: left;" align="left">The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'extensionsettings' CGI (/cgi-bin/extensionsettings) component responsible for handling some of the server's internal configurations. The CGI application doesn't properly escape the information it's passed when processing a particular multi-part form request involving scripts. The filename of the 'scriptname' variable is read in unsanitized before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. This is SonicWall Issue ID 181195.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9683&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9683" target="_blank">CVE-2016-9683</a><br><a href="http://documents.software.dell.com/sonicwall-sma-100-series/8.1.0.7/release-notes/resolved-issues?ParentProduct=868" target="_blank">CONFIRM</a><br><a href="http://pastebin.com/eJbeXgBr" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">dell -- sonicwall_secure_remote_access_server</td><td style="text-align: left;" align="left">The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'viewcert' CGI (/cgi-bin/viewcert) component responsible for processing SSL certificate information. The CGI application doesn't properly escape the information it's passed in the 'CERT' variable before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9684&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9684" target="_blank">CVE-2016-9684</a><br><a href="http://documents.software.dell.com/sonicwall-sma-100-series/8.1.0.7/release-notes/resolved-issues?ParentProduct=868" target="_blank">CONFIRM</a><br><a href="http://pastebin.com/g1e2qU6N" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">disksavvy -- disksavvy_enterprise</td><td style="text-align: left;" align="left">Buffer overflow in the built-in web server in DiskSavvy Enterprise 9.4.18 allows remote attackers to execute arbitrary code via a long URI in a GET request.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6187&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6187" target="_blank">CVE-2017-6187</a><br><a href="https://www.exploit-db.com/exploits/41436/" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">dlink -- websmart_dgs-1510_series_firmware</td><td style="text-align: left;" align="left">D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, and DGS-1510-20 Websmart devices with firmware before 1.31.B003 allow attackers to conduct Unauthenticated Command Bypass attacks via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6205&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6205" target="_blank">CVE-2017-6205</a><br><a href="http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10070" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">facebook -- hhvm</td><td style="text-align: left;" align="left">Out-of-bounds write in the (1) mb_detect_encoding, (2) mb_send_mail, and (3) mb_detect_order functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6870&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6870" target="_blank">CVE-2016-6870</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/11/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/19/1" target="_blank">MLIST</a><br><a href="https://github.com/facebook/hhvm/commit/365abe807cab2d60dc9ec307292a06181f77a9c2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">facebook -- hhvm</td><td style="text-align: left;" align="left">Integer overflow in bcmath in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, which triggers a buffer overflow.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6871&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6871" target="_blank">CVE-2016-6871</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/11/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/19/1" target="_blank">MLIST</a><br><a href="https://github.com/facebook/hhvm/commit/c00fc9d3003eb06226b58b6a48555f1456ee2475" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">facebook -- hhvm</td><td style="text-align: left;" align="left">Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6872&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6872" target="_blank">CVE-2016-6872</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/11/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/19/1" target="_blank">MLIST</a><br><a href="https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">facebook -- hhvm</td><td style="text-align: left;" align="left">Self recursion in compact in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6873&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6873" target="_blank">CVE-2016-6873</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/11/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/19/1" target="_blank">MLIST</a><br><a href="https://github.com/facebook/hhvm/commit/e264f04ae825a5d97758130cf8eec99862517e7e" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">facebook -- hhvm</td><td style="text-align: left;" align="left">The array_*_recursive functions in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors, related to recursion.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6874&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6874" target="_blank">CVE-2016-6874</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/11/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/19/1" target="_blank">MLIST</a><br><a href="https://github.com/facebook/hhvm/commit/05e706d98f748f609b19d8697e490eaab5007d69" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">facebook -- hhvm</td><td style="text-align: left;" align="left">Infinite recursion in wddx in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6875&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6875" target="_blank">CVE-2016-6875</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/11/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/19/1" target="_blank">MLIST</a><br><a href="https://github.com/facebook/hhvm/commit/1888810e77b446a79a7674784d5f139fcfa605e2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8636&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">7.2</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8636" target="_blank">CVE-2016-8636</a><br><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=647bf3d8a8e5777319da92af672289b2a6c4dc66" target="_blank">CONFIRM</a><br><a href="http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.10" target="_blank">CONFIRM</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/11/9" target="_blank">MLIST</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1421981" target="_blank">CONFIRM</a><br><a href="https://eyalitkin.wordpress.com/2017/02/11/cve-publication-cve-2016-8636/" target="_blank">MISC</a><br><a href="https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.</td><td style="text-align: center;" align="center">2017-02-18</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5986&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)" target="_blank">7.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5986" target="_blank">CVE-2017-5986</a><br><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2dcab598484185dea7ec22219c76dcdd59e3cb90" target="_blank">CONFIRM</a><br><a href="http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.11" target="_blank">CONFIRM</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/14/6" target="_blank">MLIST</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1420276" target="_blank">CONFIRM</a><br><a href="https://github.com/torvalds/linux/commit/2dcab598484185dea7ec22219c76dcdd59e3cb90" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.</td><td style="text-align: center;" align="center">2017-02-18</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6001&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)" target="_blank">7.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6001" target="_blank">CVE-2017-6001</a><br><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290" target="_blank">CONFIRM</a><br><a href="http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7" target="_blank">CONFIRM</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/16/1" target="_blank">MLIST</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1422825" target="_blank">CONFIRM</a><br><a href="https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.</td><td style="text-align: center;" align="center">2017-02-18</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6074&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)" target="_blank">9.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6074" target="_blank">CVE-2017-6074</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/22/3" target="_blank">MLIST</a><br><a href="https://github.com/torvalds/linux/commit/5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">mail-masta -- mail-masta_plugin</td><td style="text-align: left;" align="left">A SQL injection issue was discovered in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects /inc/lists/csvexport.php (Unauthenticated) with the GET Parameter: list_id.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6095&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6095" target="_blank">CVE-2017-6095</a><br><a href="https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">metalgenix -- genixcms</td><td style="text-align: left;" align="left">CSRF token bypass in GeniXCMS before 1.0.2 could result in escalation of privileges. The forgotpassword.php page can be used to acquire a token.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5959&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">7.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5959" target="_blank">CVE-2017-5959</a><br><a href="https://github.com/semplon/GeniXCMS/issues/70" target="_blank">CONFIRM</a><br><a href="https://github.com/semplon/GeniXCMS/releases/tag/v1.0.2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">netgear -- dgn2200_firmware</td><td style="text-align: left;" align="left">ping.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping_IPAddr field of an HTTP POST request.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6077&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)" target="_blank">10.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6077" target="_blank">CVE-2017-6077</a><br><a href="https://www.exploit-db.com/exploits/41394/" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">trendmicro -- interscan_web_security_virtual_appliance</td><td style="text-align: left;" align="left">Remote Command Execution in com.trend.iwss.gui.servlet.ManagePatches in Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to run arbitrary commands on the system as root via Patch Update functionality. This was resolved in Version 6.5 CP 1737.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9269&vector=(AV:N/AC:L/Au:S/C:C/I:C/A:C)" target="_blank">9.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9269" target="_blank">CVE-2016-9269</a><br><a href="https://success.trendmicro.com/solution/1116672" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">zyxel -- usg50_firmware</td><td style="text-align: left;" align="left">Zyxel USG50 Security Appliance and NWA3560-N Access Point allow remote attackers to cause a denial of service (CPU consumption) via a flood of ICMPv4 Port Unreachable packets.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-10227&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)" target="_blank">7.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10227" target="_blank">CVE-2016-10227</a><br><a href="http://www.zyxel.com/support/announcement_blacknurse_attack.shtml" target="_blank">MISC</a><br><a href="https://cxsecurity.com/issue/WLB-2017020177" target="_blank">MISC</a></td></tr></tbody></table><a href="https://www.us-cert.gov#top">Back to top</a><p><a id="ox-984aebe323-medium" name="medium" class="mce-item-anchor"></a> </p><h2 id="ox-984aebe323-medium_v_title">Medium Vulnerabilities</h2><table border="1" summary="Medium Vulnerabilities" align="center"><thead><tr><th class="ox-984aebe323-vendor-product" style="width: 24%;" scope="col">Primary<br>Vendor -- Product</th><th style="width: 44%;" scope="col">Description</th><th style="width: 8%;" scope="col">Published</th><th style="width: 4%;" scope="col">CVSS Score</th><th style="width: 10%;" scope="col">Source & Patch Info</th></tr></thead><tbody><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">aerospike -- database_server</td><td style="text-align: left;" align="left">An exploitable denial-of-service vulnerability exists in the fabric-worker component of Aerospike Database Server 3.10.0.3. A specially crafted packet can cause the server process to dereference a null pointer. An attacker can simply connect to a TCP port in order to trigger this vulnerability.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9049&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9049" target="_blank">CVE-2016-9049</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0263/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- apple_tv</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2350&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2350" target="_blank">CVE-2017-2350</a><br><a href="http://www.securityfocus.com/bid/95727" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- apple_tv</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2362&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2362" target="_blank">CVE-2017-2362</a><br><a href="http://www.securityfocus.com/bid/95727" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- apple_tv</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2365&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2365" target="_blank">CVE-2017-2365</a><br><a href="http://www.securityfocus.com/bid/95727" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- apple_tv</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2369&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2369" target="_blank">CVE-2017-2369</a><br><a href="http://www.securityfocus.com/bid/95727" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- apple_tv</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2373&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2373" target="_blank">CVE-2017-2373</a><br><a href="http://www.securityfocus.com/bid/95727" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- garageband</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. GarageBand before 10.1.6 is affected. The issue involves the "Projects" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted GarageBand project file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2374&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2374" target="_blank">CVE-2017-2374</a><br><a href="https://support.apple.com/HT207518" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- icloud</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iCloud before 6.0.1 is affected. The issue involves the setup subsystem in the "iCloud" component. It allows local users to gain privileges via a crafted dynamic library in an unspecified directory.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7583&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7583" target="_blank">CVE-2016-7583</a><br><a href="http://www.securityfocus.com/bid/94570" target="_blank">BID</a><br><a href="https://support.apple.com/HT207273" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Sandbox Profiles" component, which allows attackers to read photo-directory metadata via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4664&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4664" target="_blank">CVE-2016-4664</a><br><a href="http://www.securityfocus.com/bid/93854" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Sandbox Profiles" component, which allows attackers to read audio-recording metadata via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4665&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4665" target="_blank">CVE-2016-4665</a><br><a href="http://www.securityfocus.com/bid/93854" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Kernel" component. It allows attackers to obtain sensitive information from kernel memory via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4680&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4680" target="_blank">CVE-2016-4680</a><br><a href="http://www.securityfocus.com/bid/93854" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. The issue involves the "iTunes Backup" component, which improperly hashes passwords, making it easier to decrypt files.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4685&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4685" target="_blank">CVE-2016-4685</a><br><a href="http://www.securityfocus.com/bid/94432" target="_blank">BID</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Mail" component, which does not alert the user to an S/MIME email signature that used a revoked certificate.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4689&vector=(AV:N/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4689" target="_blank">CVE-2016-4689</a><br><a href="http://www.securityfocus.com/bid/94850" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Image Capture" component, which allows attackers to execute arbitrary code via a crafted USB HID device.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4690&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4690" target="_blank">CVE-2016-4690</a><br><a href="http://www.securityfocus.com/bid/94850" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "SpringBoard" component, which allows physically proximate attackers to bypass the passcode attempt counter and unlock a device via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4781&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4781" target="_blank">CVE-2016-4781</a><br><a href="http://www.securityfocus.com/bid/94850" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. The issue involves the "Safari" component, which allows remote web servers to cause a denial of service via a crafted URL.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7581&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7581" target="_blank">CVE-2016-7581</a><br><a href="http://www.securityfocus.com/bid/94432" target="_blank">BID</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Local Authentication" component, which does not honor the configured screen-lock time interval if the Touch ID prompt is visible.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7601&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7601" target="_blank">CVE-2016-7601</a><br><a href="http://www.securityfocus.com/bid/94850" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Graphics Driver" component, which allows remote attackers to cause a denial of service via a crafted video.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7665&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7665" target="_blank">CVE-2016-7665</a><br><a href="http://www.securityfocus.com/bid/94850" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "WebKit" component, which allows XSS attacks against Safari.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7762&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7762" target="_blank">CVE-2016-7762</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the "Contacts" component. It allows remote attackers to cause a denial of service (application crash) via a crafted contact card.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2368&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2368" target="_blank">CVE-2017-2368</a><br><a href="http://www.securityfocus.com/bid/95722" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the "WebKit" component, which allows remote attackers to launch popups via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2371&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2371" target="_blank">CVE-2017-2371</a><br><a href="http://www.securityfocus.com/bid/95735" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- itunes</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. Safari before 10.0.1 is affected. iCloud before 6.0.1 is affected. iTunes before 12.5.2 is affected. tvOS before 10.0.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4613&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4613" target="_blank">CVE-2016-4613</a><br><a href="http://www.securityfocus.com/bid/93949" target="_blank">BID</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207272" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207273" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207274" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- itunes</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10 is affected. Safari before 10 is affected. iTunes before 12.5.1 is affected. tvOS before 10 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4764&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4764" target="_blank">CVE-2016-4764</a><br><a href="http://www.securityfocus.com/bid/94430" target="_blank">BID</a><br><a href="https://support.apple.com/HT207142" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207143" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207157" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207158" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- itunes</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. Safari before 10.0.1 is affected. iCloud before 6.0.1 is affected. iTunes before 12.5.2 is affected. tvOS before 10.0.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7578&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7578" target="_blank">CVE-2016-7578</a><br><a href="http://www.securityfocus.com/bid/93949" target="_blank">BID</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207272" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207273" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207274" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- itunes</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2354&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2354" target="_blank">CVE-2017-2354</a><br><a href="http://www.securityfocus.com/bid/95736" target="_blank">BID</a><br><a href="https://support.apple.com/HT207481" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207486" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- itunes</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2355&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2355" target="_blank">CVE-2017-2355</a><br><a href="http://www.securityfocus.com/bid/95736" target="_blank">BID</a><br><a href="https://support.apple.com/HT207481" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207486" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- itunes</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2356&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2356" target="_blank">CVE-2017-2356</a><br><a href="http://www.securityfocus.com/bid/95736" target="_blank">BID</a><br><a href="https://support.apple.com/HT207481" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207486" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- itunes</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2366&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2366" target="_blank">CVE-2017-2366</a><br><a href="http://www.securityfocus.com/bid/95733" target="_blank">BID</a><br><a href="https://support.apple.com/HT207481" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207486" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- logic_pro_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. GarageBand before 10.1.5 is affected. Logic Pro X before 10.3 is affected. The issue involves the "Projects" component, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GarageBand project file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2372&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2372" target="_blank">CVE-2017-2372</a><br><a href="http://www.securityfocus.com/bid/95627" target="_blank">BID</a><br><a href="https://support.apple.com/HT207476" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207477" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12 is affected. The issue involves a sandbox escape related to launchctl process spawning in the "libxpc" component.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4617&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4617" target="_blank">CVE-2016-4617</a><br><a href="https://support.apple.com/HT207170" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "FontParser" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted font.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4660&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:P)" target="_blank">5.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4660" target="_blank">CVE-2016-4660</a><br><a href="http://www.securityfocus.com/bid/93849" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ntfs" component, which misparses disk images and allows attackers to cause a denial of service via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4661&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4661" target="_blank">CVE-2016-4661</a><br><a href="http://www.securityfocus.com/bid/93852" target="_blank">BID</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "NVIDIA Graphics Drivers" component. It allows attackers to cause a denial of service (memory corruption) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4663&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4663" target="_blank">CVE-2016-4663</a><br><a href="http://www.securityfocus.com/bid/93852" target="_blank">BID</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ATS" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4667&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4667" target="_blank">CVE-2016-4667</a><br><a href="http://www.securityfocus.com/bid/93852" target="_blank">BID</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "CoreGraphics" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4673&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4673" target="_blank">CVE-2016-4673</a><br><a href="http://www.securityfocus.com/bid/93849" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ATS" component. It allows local users to gain privileges or cause a denial of service (memory corruption and application crash) via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4674&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4674" target="_blank">CVE-2016-4674</a><br><a href="http://www.securityfocus.com/bid/93852" target="_blank">BID</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "AppleSMC" component. It allows local users to gain privileges or cause a denial of service (NULL pointer dereference) via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4678&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4678" target="_blank">CVE-2016-4678</a><br><a href="http://www.securityfocus.com/bid/93852" target="_blank">BID</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "libarchive" component, which allows remote attackers to write to arbitrary files via a crafted archive containing a symlink.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4679&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4679" target="_blank">CVE-2016-4679</a><br><a href="http://www.securityfocus.com/bid/93849" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "Core Image" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4681&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4681" target="_blank">CVE-2016-4681</a><br><a href="http://www.securityfocus.com/bid/94431" target="_blank">BID</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12 is affected. macOS before 10.12.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted SGI file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4682&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:P)" target="_blank">5.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4682" target="_blank">CVE-2016-4682</a><br><a href="http://www.securityfocus.com/bid/93852" target="_blank">BID</a><br><a href="https://support.apple.com/HT207170" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds memory access and application crash) via a crafted SGI file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4683&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4683" target="_blank">CVE-2016-4683</a><br><a href="http://www.securityfocus.com/bid/94431" target="_blank">BID</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "FontParser" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted font.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4688&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4688" target="_blank">CVE-2016-4688</a><br><a href="http://www.securityfocus.com/bid/94572" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. The issue involves the "IDS - Connectivity" component, which allows man-in-the-middle attackers to spoof calls via a "switch caller" notification.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4721&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4721" target="_blank">CVE-2016-4721</a><br><a href="http://www.securityfocus.com/bid/94429" target="_blank">BID</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. The issue involves the "FaceTime" component, which allows remote attackers to trigger memory corruption and obtain audio data from a call that appeared to have ended.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7577&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7577" target="_blank">CVE-2016-7577</a><br><a href="http://www.securityfocus.com/bid/94429" target="_blank">BID</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. The issue involves the "CFNetwork Proxies" component, which allows man-in-the-middle attackers to spoof a proxy password authentication requirement and obtain sensitive information.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7579&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7579" target="_blank">CVE-2016-7579</a><br><a href="http://www.securityfocus.com/bid/93856" target="_blank">BID</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12 is affected. The issue involves the "Mail" component, which allows remote web servers to cause a denial of service via a crafted URL.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7580&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7580" target="_blank">CVE-2016-7580</a><br><a href="http://www.securityfocus.com/bid/94434" target="_blank">BID</a><br><a href="https://support.apple.com/HT207170" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "AppleMobileFileIntegrity" component, which allows remote attackers to spoof signed code by using a matching team ID.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7584&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7584" target="_blank">CVE-2016-7584</a><br><a href="http://www.securityfocus.com/bid/94571" target="_blank">BID</a><br><a href="https://support.apple.com/HT207269" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "CoreStorage" component. It allows local users to cause a denial of service (NULL pointer dereference) via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7603&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:C)" target="_blank">4.9</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7603" target="_blank">CVE-2016-7603</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "CoreCapture" component. It allows local users to cause a denial of service (NULL pointer dereference) via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7604&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:C)" target="_blank">4.9</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7604" target="_blank">CVE-2016-7604</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "Bluetooth" component. It allows attackers to cause a denial of service (NULL pointer dereference) via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7605&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7605" target="_blank">CVE-2016-7605</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "AppleGraphicsPowerManagement" component. It allows local users to cause a denial of service (NULL pointer dereference) via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7609&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:C)" target="_blank">4.9</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7609" target="_blank">CVE-2016-7609</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "Foundation" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted .gcx file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7618&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7618" target="_blank">CVE-2016-7618</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "Grapher" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted .gcx file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7622&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7622" target="_blank">CVE-2016-7622</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. The issue involves the "CoreMedia External Displays" component. It allows local users to gain privileges or cause a denial of service (type confusion) via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7655&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7655" target="_blank">CVE-2016-7655</a><br><a href="http://www.securityfocus.com/bid/94906" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. The issue involves the "CoreText" component. It allows remote attackers to cause a denial of service via a crafted string.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7667&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7667" target="_blank">CVE-2016-7667</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "xar" component, which allows remote attackers to execute arbitrary code via a crafted archive that triggers use of uninitialized memory locations.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7742&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7742" target="_blank">CVE-2016-7742</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.3 is affected. The issue involves the "IOAudioFamily" component. It allows attackers to obtain sensitive kernel memory-layout information via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2357&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2357" target="_blank">CVE-2017-2357</a><br><a href="http://www.securityfocus.com/bid/95723" target="_blank">BID</a><br><a href="https://support.apple.com/HT207483" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.3 is affected. The issue involves the "Help Viewer" component, which allows XSS attacks via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2361&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2361" target="_blank">CVE-2017-2361</a><br><a href="http://www.securityfocus.com/bid/95723" target="_blank">BID</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1040" target="_blank">MISC</a><br><a href="https://support.apple.com/HT207483" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. Safari before 10.0.1 is affected. tvOS before 10.0.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4666&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4666" target="_blank">CVE-2016-4666</a><br><a href="http://www.securityfocus.com/bid/93851" target="_blank">BID</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207272" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. Safari before 10.0.1 is affected. tvOS before 10.0.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4677&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4677" target="_blank">CVE-2016-4677</a><br><a href="http://www.securityfocus.com/bid/93853" target="_blank">BID</a><br><a href="https://support.apple.com/HT207270" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207272" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4692&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4692" target="_blank">CVE-2016-4692</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4743&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:P)" target="_blank">5.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4743" target="_blank">CVE-2016-4743</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7586&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7586" target="_blank">CVE-2016-7586</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7587&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7587" target="_blank">CVE-2016-7587</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component, which allows remote attackers to obtain sensitive information via crafted JavaScript prompts on a web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7592&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7592" target="_blank">CVE-2016-7592</a><br><a href="http://www.securityfocus.com/bid/94909" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7598&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7598" target="_blank">CVE-2016-7598</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses HTTP redirects.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7599&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7599" target="_blank">CVE-2016-7599</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7610&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7610" target="_blank">CVE-2016-7610</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7611&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7611" target="_blank">CVE-2016-7611</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a blob URL on a web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7623&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7623" target="_blank">CVE-2016-7623</a><br><a href="http://www.securityfocus.com/bid/94913" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7632&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7632" target="_blank">CVE-2016-7632</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7635&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7635" target="_blank">CVE-2016-7635</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7639&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7639" target="_blank">CVE-2016-7639</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7640&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7640" target="_blank">CVE-2016-7640</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7641&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7641" target="_blank">CVE-2016-7641</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7642&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7642" target="_blank">CVE-2016-7642</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7645&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7645" target="_blank">CVE-2016-7645</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7646&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7646" target="_blank">CVE-2016-7646</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7648&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7648" target="_blank">CVE-2016-7648</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7649&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7649" target="_blank">CVE-2016-7649</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7652&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7652" target="_blank">CVE-2016-7652</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7654&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7654" target="_blank">CVE-2016-7654</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7656&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7656" target="_blank">CVE-2016-7656</a><br><a href="http://www.securityfocus.com/bid/94907" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. Safari before 10.0.3 is affected. The issue involves the "Safari" component, which allows remote attackers to spoof the address bar via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2359&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2359" target="_blank">CVE-2017-2359</a><br><a href="http://www.securityfocus.com/bid/95724" target="_blank">BID</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2364&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2364" target="_blank">CVE-2017-2364</a><br><a href="http://www.securityfocus.com/bid/95725" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- transporter</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. Transporter before 1.9.2 is affected. The issue involves the "iTMSTransporter" component, which allows attackers to obtain sensitive information via a crafted EPUB.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7666&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7666" target="_blank">CVE-2016-7666</a><br><a href="http://www.securityfocus.com/bid/94912" target="_blank">BID</a><br><a href="https://support.apple.com/HT207432" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "FontParser" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4691&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4691" target="_blank">CVE-2016-4691</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Security" component, which makes it easier for attackers to bypass cryptographic protection mechanisms by leveraging use of the 3DES cipher.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4693&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4693" target="_blank">CVE-2016-4693</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "CoreMedia Playback" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted MP4 file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7588&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7588" target="_blank">CVE-2016-7588</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. watchOS before 3.1.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7589&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7589" target="_blank">CVE-2016-7589</a><br><a href="http://www.securityfocus.com/bid/94908" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207427" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "ICU" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7594&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7594" target="_blank">CVE-2016-7594</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "CoreText" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7595&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7595" target="_blank">CVE-2016-7595</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component, which allows attackers to obtain sensitive information from kernel memory via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7607&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7607" target="_blank">CVE-2016-7607</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component, which allows local users to cause a denial of service via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7615&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:C)" target="_blank">4.9</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7615" target="_blank">CVE-2016-7615</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. tvOS before 10.1 is affected. watchOS before 3.1.1 is affected. The issue involves the "Profiles" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted certificate profile.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7626&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7626" target="_blank">CVE-2016-7626</a><br><a href="http://www.securityfocus.com/bid/94852" target="_blank">BID</a><br><a href="https://lists.apple.com/archives/security-announce/2016/Dec/msg00001.html" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207425" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "CoreGraphics" component. It allows attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted font.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7627&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7627" target="_blank">CVE-2016-7627</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Security" component, which allows man-in-the-middle attackers to cause a denial of service (application crash) via vectors related to OCSP responder URLs.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7636&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7636" target="_blank">CVE-2016-7636</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "ImageIO" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7643&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:P)" target="_blank">5.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7643" target="_blank">CVE-2016-7643</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. watchOS before 3.1.1 is affected. The issue involves the "Accounts" component, which allows local users to bypass intended authorization restrictions by leveraging the mishandling of an app uninstall.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7651&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7651" target="_blank">CVE-2016-7651</a><br><a href="http://www.securityfocus.com/bid/94851" target="_blank">BID</a><br><a href="https://lists.apple.com/archives/security-announce/2016/Dec/msg00001.html" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "IOKit" component. It allows attackers to obtain sensitive information from kernel memory via a crafted app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7657&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7657" target="_blank">CVE-2016-7657</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7658&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7658" target="_blank">CVE-2016-7658</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7659&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7659" target="_blank">CVE-2016-7659</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Security" component, which allows remote attackers to spoof certificates via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7662&vector=(AV:N/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7662" target="_blank">CVE-2016-7662</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2363&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2363" target="_blank">CVE-2017-2363</a><br><a href="http://www.securityfocus.com/bid/95728" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207484" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207485" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- identity_services_engine_software</td><td style="text-align: left;" align="left">A vulnerability in the sponsor portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access notices owned by other users, because of SQL Injection. More Information: CSCvb15627. Known Affected Releases: 1.4(0.908).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3835&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)" target="_blank">6.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3835" target="_blank">CVE-2017-3835</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-ise" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- intrusion_prevention_system_device_manager</td><td style="text-align: left;" align="left">A vulnerability in the web-based management interface of the Cisco Intrusion Prevention System Device Manager (IDM) could allow an unauthenticated, remote attacker to view sensitive information stored in certain HTML comments. More Information: CSCuh91455. Known Affected Releases: 7.2(1)V7.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3842&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3842" target="_blank">CVE-2017-3842</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-idm" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- meeting_server</td><td style="text-align: left;" align="left">A vulnerability in an internal API of the Cisco Meeting Server (CMS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected appliance. More Information: CSCvc89678. Known Affected Releases: 2.1. Known Fixed Releases: 2.1.2.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3830&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3830" target="_blank">CVE-2017-3830</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cms" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- meeting_server</td><td style="text-align: left;" align="left">An HTTP Packet Processing vulnerability in the Web Bridge interface of the Cisco Meeting Server (CMS), formerly Acano Conferencing Server, could allow an authenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. In addition, the attacker could potentially cause the application to crash unexpectedly, resulting in a denial of service (DoS) condition. The attacker would need to be authenticated and have a valid session with the Web Bridge. Affected Products: This vulnerability affects Cisco Meeting Server software releases prior to 2.1.2. This product was previously known as Acano Conferencing Server. More Information: CSCvc89551. Known Affected Releases: 2.0 2.0.7 2.1. Known Fixed Releases: 2.1.2.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3837&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:P)" target="_blank">5.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3837" target="_blank">CVE-2017-3837</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cms1" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- prime_collaboration_assurance</td><td style="text-align: left;" align="left">A vulnerability in the file download functions for Cisco Prime Collaboration Assurance could allow an authenticated, remote attacker to download system files that should be restricted. More Information: CSCvc99446. Known Affected Releases: 11.5(0).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3843&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3843" target="_blank">CVE-2017-3843</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-pcp1" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- prime_collaboration_assurance</td><td style="text-align: left;" align="left">A vulnerability in exporting functions of the user interface for Cisco Prime Collaboration Assurance could allow an authenticated, remote attacker to view file directory listings and download files. Affected Products: Cisco Prime Collaboration Assurance software versions 11.0, 11.1, and 11.5 are vulnerable. Cisco Prime Collaboration Assurance software versions prior to 11.0 are not vulnerable. More Information: CSCvc86238. Known Affected Releases: 11.5(0).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3844&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3844" target="_blank">CVE-2017-3844</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-pcp2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- prime_collaboration_assurance</td><td style="text-align: left;" align="left">A vulnerability in the web-based management interface of Cisco Prime Collaboration Assurance could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. Affected Products: Cisco Prime Collaboration Assurance software versions 11.0, 11.1, and 11.5 are vulnerable. Cisco Prime Collaboration Assurance software versions prior to 11.0 are not vulnerable. More Information: CSCvc77783. Known Affected Releases: 11.5(0).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3845&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3845" target="_blank">CVE-2017-3845</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-pcp3" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- secure_access_control_system</td><td style="text-align: left;" align="left">A vulnerability in Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to conduct a DOM-based cross-site scripting (XSS) attack against the user of the web interface of the affected system. More Information: CSCvc04838. Known Affected Releases: 5.8(2.5).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3838&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3838" target="_blank">CVE-2017-3838</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- secure_access_control_system</td><td style="text-align: left;" align="left">An XML External Entity vulnerability in the web-based user interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to have read access to part of the information stored in the affected system. More Information: CSCvc04845. Known Affected Releases: 5.8(2.5).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3839&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3839" target="_blank">CVE-2017-3839</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs1" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- secure_access_control_system</td><td style="text-align: left;" align="left">A vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page, aka an Open Redirect Vulnerability. More Information: CSCvc04849. Known Affected Releases: 5.8(2.5).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3840&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:N)" target="_blank">5.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3840" target="_blank">CVE-2017-3840</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- secure_access_control_system</td><td style="text-align: left;" align="left">A vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to disclose sensitive information. More Information: CSCvc04854. Known Affected Releases: 5.8(2.5).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3841&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3841" target="_blank">CVE-2017-3841</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs3" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- unified_communications_manager</td><td style="text-align: left;" align="left">A vulnerability in the serviceability page of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct reflected cross-site scripting (XSS) attacks. More Information: CSCvc49348. Known Affected Releases: 10.5(2.14076.1). Known Fixed Releases: 12.0(0.98000.209) 12.0(0.98000.478) 12.0(0.98000.609).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3821&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3821" target="_blank">CVE-2017-3821</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cucm" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- unified_communications_manager</td><td style="text-align: left;" align="left">A vulnerability in the web-based management interface of Cisco Unified Communications Manager Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. More Information: CSCvb98777. Known Affected Releases: 11.0(1.10000.10) 11.5(1.10000.6). Known Fixed Releases: 11.0(1.23063.1) 11.5(1.12029.1) 11.5(1.12900.11) 11.5(1.12900.21) 11.6(1.10000.4) 12.0(0.98000.156) 12.0(0.98000.178) 12.0(0.98000.369) 12.0(0.98000.470) 12.0(0.98000.536) 12.0(0.98000.6) 12.0(0.98500.6).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3828&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3828" target="_blank">CVE-2017-3828</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cucm1" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- unified_communications_manager</td><td style="text-align: left;" align="left">A vulnerability in the web-based management interface of Cisco Unified Communications Manager Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. More Information: CSCvc30999. Known Affected Releases: 12.0(0.98000.280). Known Fixed Releases: 11.0(1.23900.3) 12.0(0.98000.180) 12.0(0.98000.422) 12.0(0.98000.541) 12.0(0.98000.6).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3829&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3829" target="_blank">CVE-2017-3829</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cucm2" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- unified_communications_manager</td><td style="text-align: left;" align="left">A vulnerability in the web framework of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected software. More Information: CSCvb95951. Known Affected Releases: 12.0(0.99999.2). Known Fixed Releases: 11.0(1.23064.1) 11.5(1.12031.1) 11.5(1.12900.21) 11.5(1.12900.7) 11.5(1.12900.8) 11.6(1.10000.4) 12.0(0.98000.155) 12.0(0.98000.178) 12.0(0.98000.366) 12.0(0.98000.367) 12.0(0.98000.468) 12.0(0.98000.469) 12.0(0.98000.536) 12.0(0.98000.6) 12.0(0.98500.6).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3833&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3833" target="_blank">CVE-2017-3833</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-ucm" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- unified_communications_manager</td><td style="text-align: left;" align="left">A vulnerability in the web framework Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to view sensitive data. More Information: CSCvb61689. Known Affected Releases: 11.5(1.11007.2). Known Fixed Releases: 12.0(0.98000.162) 12.0(0.98000.178) 12.0(0.98000.383) 12.0(0.98000.488) 12.0(0.98000.536) 12.0(0.98000.6) 12.0(0.98500.6).</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3836&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3836" target="_blank">CVE-2017-3836</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cucm3" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cmsmadesimple -- form_builder</td><td style="text-align: left;" align="left">CMS Made Simple version 1.x Form Builder before version 0.8.1.6 allows remote attackers to conduct information-disclosure attacks via exportxml.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6071&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6071" target="_blank">CVE-2017-6071</a><br><a href="http://dev.cmsmadesimple.org/project/files/69" target="_blank">MISC</a><br><a href="https://daylight-it.com/security-advisory-dlcs0001.html" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cmsmadesimple -- form_builder</td><td style="text-align: left;" align="left">CMS Made Simple version 1.x Form Builder before version 0.8.1.6 allows remote attackers to conduct information-disclosure attacks via defaultadmin.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6072&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6072" target="_blank">CVE-2017-6072</a><br><a href="http://dev.cmsmadesimple.org/project/files/69" target="_blank">MISC</a><br><a href="https://daylight-it.com/security-advisory-dlcs0001.html" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">digisol -- dg-hr1400_firmware</td><td style="text-align: left;" align="left">Multiple cross-site request forgery (CSRF) vulnerabilities in the access portal on the DIGISOL DG-HR1400 Wireless Router with firmware 1.00.02 allow remote attackers to hijack the authentication of administrators for requests that (1) change the SSID, (2) change the Wi-Fi password, or (3) possibly have unspecified other impact via crafted requests to form2WlanBasicSetup.cgi.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6127&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6127" target="_blank">CVE-2017-6127</a><br><a href="http://seclists.org/fulldisclosure/2017/Feb/55" target="_blank">FULLDISC</a><br><a href="https://drive.google.com/file/d/0B6715xUqH18MeV9GOVE0ZmFrQUU/view" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">dlink -- websmart_dgs-1510_series_firmware</td><td style="text-align: left;" align="left">D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, and DGS-1510-20 Websmart devices with firmware before 1.31.B003 allow attackers to conduct Unauthenticated Information Disclosure attacks via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6206&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6206" target="_blank">CVE-2017-6206</a><br><a href="http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10070" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">faststone -- maxview</td><td style="text-align: left;" align="left">FastStone MaxView 3.0 and 3.1 allows user-assisted attackers to cause a denial of service (application crash) via a malformed BMP image with a crafted biSize field in the BITMAPINFOHEADER section.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6078&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6078" target="_blank">CVE-2017-6078</a><br><a href="https://github.com/ilsani/rd/tree/master/security-advisories/faststone/maxview-cve-2017-6078" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">fedoraproject -- fedora</td><td style="text-align: left;" align="left">The route manager in FlightGear before 2016.4.4 allows remote attackers to write to arbitrary files via a crafted Nasal script.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9956&vector=(AV:N/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9956" target="_blank">CVE-2016-9956</a><br><a href="http://www.debian.org/security/2016/dsa-3742" target="_blank">DEBIAN</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/14/11" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/15/10" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/16/5" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/94945" target="_blank">BID</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZKAN7V6UOHSRFWO567XMN4O6WXTSL32/" target="_blank">FEDORA</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DB3B5XBB2NL2O2U4WNYGH7ZL45Q4UHGG/" target="_blank">FEDORA</a><br><a href="https://sourceforge.net/p/flightgear/flightgear/ci/280cd523686fbdb175d50417266d2487a8ce67d2/" target="_blank">CONFIRM</a><br><a href="https://sourceforge.net/projects/flightgear/files/release-2016.4/" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">gomlab -- gom_player</td><td style="text-align: left;" align="left">GOM Player 2.3.10.5266 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted fpx file.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5881&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5881" target="_blank">CVE-2017-5881</a><br><a href="https://www.exploit-db.com/exploits/41367/" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">google -- chrome</td><td style="text-align: left;" align="left">Interactions with the OS in Google Chrome prior to 56.0.2924.76 for Mac insufficiently cleared video memory, which allowed a remote attacker to possibly extract image fragments on systems with GeForce 8600M graphics chips via a crafted HTML page.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5017&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5017" target="_blank">CVE-2017-5017</a><br><a href="http://www.securityfocus.com/bid/95792" target="_blank">BID</a><br><a href="https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html" target="_blank">CONFIRM</a><br><a href="https://crbug.com/676975" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">google -- chrome</td><td style="text-align: left;" align="left">Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, had an insufficiently strict content security policy on the Chrome app launcher page, which allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5018&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5018" target="_blank">CVE-2017-5018</a><br><a href="http://www.securityfocus.com/bid/95792" target="_blank">BID</a><br><a href="https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html" target="_blank">CONFIRM</a><br><a href="https://crbug.com/668665" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">google -- chrome</td><td style="text-align: left;" align="left">A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5021&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5021" target="_blank">CVE-2017-5021</a><br><a href="http://www.securityfocus.com/bid/95792" target="_blank">BID</a><br><a href="https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html" target="_blank">CONFIRM</a><br><a href="https://crbug.com/663726" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">google -- chrome</td><td style="text-align: left;" align="left">FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5024&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5024" target="_blank">CVE-2017-5024</a><br><a href="http://www.securityfocus.com/bid/95792" target="_blank">BID</a><br><a href="https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html" target="_blank">CONFIRM</a><br><a href="https://crbug.com/643951" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">html5lib -- html5lib</td><td style="text-align: left;" align="left">The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of the < (less than) character in attribute values.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9909&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9909" target="_blank">CVE-2016-9909</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/06/5" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/8" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/95132" target="_blank">BID</a><br><a href="https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7" target="_blank">CONFIRM</a><br><a href="https://github.com/html5lib/html5lib-python/issues/11" target="_blank">CONFIRM</a><br><a href="https://github.com/html5lib/html5lib-python/issues/12" target="_blank">CONFIRM</a><br><a href="https://html5lib.readthedocs.io/en/latest/changes.html#b9" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">html5lib -- html5lib</td><td style="text-align: left;" align="left">The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of special characters in attribute values, a different vulnerability than CVE-2016-9909.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9910&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9910" target="_blank">CVE-2016-9910</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/06/5" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/12/08/8" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/95132" target="_blank">BID</a><br><a href="https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7" target="_blank">CONFIRM</a><br><a href="https://github.com/html5lib/html5lib-python/issues/11" target="_blank">CONFIRM</a><br><a href="https://github.com/html5lib/html5lib-python/issues/12" target="_blank">CONFIRM</a><br><a href="https://html5lib.readthedocs.io/en/latest/changes.html#b9" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- inotes</td><td style="text-align: left;" align="left">IBM iNotes 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1997010.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5883&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5883" target="_blank">CVE-2016-5883</a><br><a href="http://www.ibm.com/support/docview.wss?uid=swg21997010" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- websphere_mq</td><td style="text-align: left;" align="left">IBM WebSphere MQ 8.0 could allow an authenticated user to crash the MQ channel due to improper data conversion handling. IBM Reference #: 1998661.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-3013&vector=(AV:N/AC:L/Au:S/C:N/I:N/A:P)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3013" target="_blank">CVE-2016-3013</a><br><a href="http://www.ibm.com/support/docview.wss?uid=swg21998661" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- websphere_mq</td><td style="text-align: left;" align="left">IBM WebSphere MQ 8.0, under nonstandard configurations, sends password data in cleartext over the network that could be intercepted using main in the middle techniques. IBM Reference #: 1998660.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-3052&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3052" target="_blank">CVE-2016-3052</a><br><a href="http://www.ibm.com/support/docview.wss?uid=swg21998660" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- websphere_mq</td><td style="text-align: left;" align="left">IBM WebSphere MQ 8.0 could allow an authenticated user with access to the queue manager and queue, to deny service to other channels running under the same process. IBM Reference #: 1998649.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8915&vector=(AV:N/AC:L/Au:S/C:N/I:N/A:P)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8915" target="_blank">CVE-2016-8915</a><br><a href="http://www.ibm.com/support/docview.wss?uid=swg21998649" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- websphere_mq</td><td style="text-align: left;" align="left">IBM WebSphere MQ 8.0 could allow an authenticated user with access to the queue manager to bring down MQ channels using specially crafted HTTP requests. IBM Reference #: 1998648.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-8986&vector=(AV:N/AC:L/Au:S/C:N/I:N/A:P)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8986" target="_blank">CVE-2016-8986</a><br><a href="http://www.ibm.com/support/docview.wss?uid=swg21998648" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">inverse-inc -- sogo</td><td style="text-align: left;" align="left">Multiple cross-site scripting (XSS) vulnerabilities in the Web Calendar in SOGo before 2.2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) title of an appointment or (2) contact fields.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2014-9905&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9905" target="_blank">CVE-2014-9905</a><br><a href="http://www.openwall.com/lists/oss-security/2016/07/09/3" target="_blank">MLIST</a><br><a href="https://github.com/inverse-inc/sogo/commit/1a7fc2a0e90a19dfb1fce292ae5ff53aa513ade9" target="_blank">CONFIRM</a><br><a href="https://github.com/inverse-inc/sogo/commit/3a5e44e7eb8b390b67a8f8a83030b49606956501" target="_blank">CONFIRM</a><br><a href="https://github.com/inverse-inc/sogo/commit/80a09407652ec04e8c9fb6cb48e1029e69a15765" target="_blank">CONFIRM</a><br><a href="https://github.com/inverse-inc/sogo/commit/c94595ea7f0f843c2d7abf25df039b2bbe707625" target="_blank">CONFIRM</a><br><a href="https://sogo.nu/bugs/view.php?id=2598" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">inverse-inc -- sogo</td><td style="text-align: left;" align="left">Incomplete blacklist in SOGo before 2.3.12 and 3.x before 3.1.1 allows remote authenticated users to obtain sensitive information by reading the fields in the (1) ics or (2) XML calendar feeds.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6189&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6189" target="_blank">CVE-2016-6189</a><br><a href="http://www.openwall.com/lists/oss-security/2016/07/09/3" target="_blank">MLIST</a><br><a href="https://github.com/inverse-inc/sogo/commit/717f45f640a2866b76a8984139391fae64339225" target="_blank">CONFIRM</a><br><a href="https://github.com/inverse-inc/sogo/commit/875a4aca3218340fd4d3141950c82c2ff45b343d" target="_blank">CONFIRM</a><br><a href="https://sogo.nu/bugs/view.php?id=3695" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">inverse-inc -- sogo</td><td style="text-align: left;" align="left">SOGo before 2.3.12 and 3.x before 3.1.1 does not restrict access to the UID and DTSTAMP attributes, which allows remote authenticated users to obtain sensitive information about appointments with the "View the Date & Time" restriction, as demonstrated by correlating UIDs and DTSTAMPs between all users.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6190&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6190" target="_blank">CVE-2016-6190</a><br><a href="http://www.openwall.com/lists/oss-security/2016/07/09/3" target="_blank">MLIST</a><br><a href="https://github.com/inverse-inc/sogo/commit/717f45f640a2866b76a8984139391fae64339225" target="_blank">CONFIRM</a><br><a href="https://github.com/inverse-inc/sogo/commit/875a4aca3218340fd4d3141950c82c2ff45b343d" target="_blank">CONFIRM</a><br><a href="https://sogo.nu/bugs/view.php?id=3696" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">inverse-inc -- sogo</td><td style="text-align: left;" align="left">Multiple cross-site scripting (XSS) vulnerabilities in the View Raw Source page in the Web Calendar in SOGo before 3.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) Description, (2) Location, (3) URL, or (4) Title field.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6191&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6191" target="_blank">CVE-2016-6191</a><br><a href="http://www.openwall.com/lists/oss-security/2016/07/09/3" target="_blank">MLIST</a><br><a href="https://github.com/inverse-inc/sogo/commit/64ce3c9c22fd9a28caabf11e76216cd53d0245aa" target="_blank">CONFIRM</a><br><a href="https://sogo.nu/bugs/view.php?id=3718" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The print_frame_inst_bytes function in libdwarf before 20160923 allows remote attackers to cause a denial of service (NULL pointer dereference) via an object file with empty bss-like sections.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5028&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5028" target="_blank">CVE-2016-5028</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The create_fullest_file_path function in libdwarf before 20160923 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted dwarf file.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5029&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5029" target="_blank">CVE-2016-5029</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The _dwarf_calculate_info_section_end_ptr function in libdwarf before 20160923 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5030&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5030" target="_blank">CVE-2016-5030</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The print_frame_inst_bytes function in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5031&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5031" target="_blank">CVE-2016-5031</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The dwarf_get_xu_hash_entry function in libdwarf before 20160923 allows remote attackers to cause a denial of service (crash) via a crafted file.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5032&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5032" target="_blank">CVE-2016-5032</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The print_exprloc_content function in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5033&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5033" target="_blank">CVE-2016-5033</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">dwarf_elf_access.c in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file, related to relocation records.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5034&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5034" target="_blank">CVE-2016-5034</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The _dwarf_read_line_table_header function in dwarf_line_table_reader.c in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5035&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5035" target="_blank">CVE-2016-5035</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The dump_block function in print_sections.c in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted frame data.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5036&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5036" target="_blank">CVE-2016-5036</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The _dwarf_load_section function in libdwarf before 20160923 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5037&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5037" target="_blank">CVE-2016-5037</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The dwarf_get_macro_startend_file function in dwarf_macro5.c in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted string offset for .debug_str.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5038&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5038" target="_blank">CVE-2016-5038</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The get_attr_value function in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted object with all-bits on.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5039&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5039" target="_blank">CVE-2016-5039</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a large length value in a compilation unit header.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5040&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5040" target="_blank">CVE-2016-5040</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The dwarf_get_aranges_list function in libdwarf before 20160923 allows remote attackers to cause a denial of service (infinite loop and crash) via a crafted DWARF section.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5042&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5042" target="_blank">CVE-2016-5042</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1332145" target="_blank">CONFIRM</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The dwarf_dealloc function in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted DWARF section.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5043&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5043" target="_blank">CVE-2016-5043</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The WRITE_UNALIGNED function in dwarf_elf_access.c in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via a crafted DWARF section.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5044&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5044" target="_blank">CVE-2016-5044</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://www.prevanders.net/dwarfbug.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">The read_line_table_program function in dwarf_line_table_reader_common.c in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted input.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7510&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7510" target="_blank">CVE-2016-7510</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1377015" target="_blank">MISC</a><br><a href="https://sourceforge.net/p/libdwarf/bugs/4/" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf_project -- libdwarf</td><td style="text-align: left;" align="left">Integer overflow in the dwarf_die_deliv.c in libdwarf 20160613 allows remote attackers to cause a denial of service (crash) via a crafted file.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7511&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7511" target="_blank">CVE-2016-7511</a><br><a href="https://sourceforge.net/p/libdwarf/bugs/3/" target="_blank">CONFIRM</a><br><a href="https://www.prevanders.net/dwarfbug.html#DW201609-002" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5669&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5669" target="_blank">CVE-2017-5669</a><br><a href="https://bugzilla.kernel.org/show_bug.cgi?id=192931" target="_blank">MISC</a><br><a href="https://github.com/torvalds/linux/commit/e1d35d4dc7f089e6c9c080d556feedf9c706f0c7" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">linux -- linux_kernel</td><td style="text-align: left;" align="left">The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6214&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6214" target="_blank">CVE-2017-6214</a><br><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccf7abb93af09ad0868ae9033d1ca8108bdaec82" target="_blank">CONFIRM</a><br><a href="http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.11" target="_blank">CONFIRM</a><br><a href="https://github.com/torvalds/linux/commit/ccf7abb93af09ad0868ae9033d1ca8108bdaec82" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">mail-masta -- mail-masta_plugin</td><td style="text-align: left;" align="left">A SQL injection issue was discovered in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects /inc/lists/view-list.php (Requires authentication to Wordpress admin) with the GET Parameter: filter_list.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6096&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)" target="_blank">6.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6096" target="_blank">CVE-2017-6096</a><br><a href="https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">mail-masta -- mail-masta_plugin</td><td style="text-align: left;" align="left">A SQL injection issue was discovered in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects /inc/campaign/count_of_send.php (Requires authentication to Wordpress admin) with the POST Parameter: camp_id.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6097&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)" target="_blank">6.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6097" target="_blank">CVE-2017-6097</a><br><a href="https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">mail-masta -- mail-masta_plugin</td><td style="text-align: left;" align="left">A SQL injection issue was discovered in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects /inc/campaign_save.php (Requires authentication to Wordpress admin) with the POST Parameter: list_id.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6098&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)" target="_blank">6.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6098" target="_blank">CVE-2017-6098</a><br><a href="https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">mantisbt -- mantisbt</td><td style="text-align: left;" align="left">Cross-site scripting (XSS) vulnerability in manage_custom_field_edit_page.php in MantisBT 1.2.19 and earlier allows remote attackers to inject arbitrary web script or HTML via the return parameter.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-5364&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5364" target="_blank">CVE-2016-5364</a><br><a href="http://www.openwall.com/lists/oss-security/2016/06/11/5" target="_blank">MLIST</a><br><a href="https://github.com/mantisbt/mantisbt/commit/11ab3d6c82a1d3a89b1024f77349fb60a83743c5" target="_blank">CONFIRM</a><br><a href="https://github.com/mantisbt/mantisbt/commit/5068df2dcf79c34741c746c9b27e0083f2a374da" target="_blank">CONFIRM</a><br><a href="https://mantisbt.org/bugs/view.php?id=20956" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">metalgenix -- genixcms</td><td style="text-align: left;" align="left">SQL injection vulnerability in inc/lib/Control/Backend/menus.control.php in GeniXCMS through 1.0.2 allows remote authenticated users to execute arbitrary SQL commands via the order parameter.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6065&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)" target="_blank">6.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6065" target="_blank">CVE-2017-6065</a><br><a href="https://github.com/semplon/GeniXCMS/issues/71" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">shadow_project -- shadow</td><td style="text-align: left;" align="left">Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6252&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)" target="_blank">4.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6252" target="_blank">CVE-2016-6252</a><br><a href="http://www.openwall.com/lists/oss-security/2016/07/19/6" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/07/19/7" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/07/20/2" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/07/25/7" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/92055" target="_blank">BID</a><br><a href="https://bugzilla.suse.com/show_bug.cgi?id=979282" target="_blank">CONFIRM</a><br><a href="https://github.com/shadow-maint/shadow/issues/27" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">tcpdf_project -- tcpdf</td><td style="text-align: left;" align="left">tcpdf before 6.2.0 uploads files from the server generating PDF-files to an external FTP.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6100&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">5.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6100" target="_blank">CVE-2017-6100</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/19/1" target="_blank">MLIST</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=814030" target="_blank">CONFIRM</a><br><a href="https://sourceforge.net/p/tcpdf/bugs/1005/" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">tnef_project -- tnef</td><td style="text-align: left;" align="left">An issue was discovered in tnef before 1.4.13. Two OOB Writes have been identified in src/mapi_attr.c:mapi_attr_read(). These might lead to invalid read and write operations, controlled by an attacker.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6307&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6307" target="_blank">CVE-2017-6307</a><br><a href="https://github.com/verdammelt/tnef/blob/master/ChangeLog" target="_blank">MISC</a><br><a href="https://github.com/verdammelt/tnef/commit/1a17af1ed0c791aec44dbdc9eab91218cc1e335a" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-004-tnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">tnef_project -- tnef</td><td style="text-align: left;" align="left">An issue was discovered in tnef before 1.4.13. Several Integer Overflows, which can lead to Heap Overflows, have been identified in the functions that wrap memory allocation.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6308&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6308" target="_blank">CVE-2017-6308</a><br><a href="https://github.com/verdammelt/tnef/blob/master/ChangeLog" target="_blank">MISC</a><br><a href="https://github.com/verdammelt/tnef/commit/c5044689e50039635e7700fe2472fd632ac77176" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-004-tnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">tnef_project -- tnef</td><td style="text-align: left;" align="left">An issue was discovered in tnef before 1.4.13. Two type confusions have been identified in the parse_file() function. These might lead to invalid read and write operations, controlled by an attacker.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6309&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6309" target="_blank">CVE-2017-6309</a><br><a href="https://github.com/verdammelt/tnef/blob/master/ChangeLog" target="_blank">MISC</a><br><a href="https://github.com/verdammelt/tnef/commit/8dccf79857ceeb7a6d3e42c1e762e7b865d5344d" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-004-tnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">tnef_project -- tnef</td><td style="text-align: left;" align="left">An issue was discovered in tnef before 1.4.13. Four type confusions have been identified in the file_add_mapi_attrs() function. These might lead to invalid read and write operations, controlled by an attacker.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6310&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6310" target="_blank">CVE-2017-6310</a><br><a href="https://github.com/verdammelt/tnef/blob/master/ChangeLog" target="_blank">MISC</a><br><a href="https://github.com/verdammelt/tnef/commit/8dccf79857ceeb7a6d3e42c1e762e7b865d5344d" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-004-tnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">trendmicro -- interscan_web_security_virtual_appliance</td><td style="text-align: left;" align="left">Sensitive Information Disclosure in com.trend.iwss.gui.servlet.ConfigBackup in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to backup the system configuration and download it onto their local machine. This backup file contains sensitive information like passwd/shadow files, RSA certificates, Private Keys and Default Passphrase, etc. This was resolved in Version 6.5 CP 1737.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9314&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9314" target="_blank">CVE-2016-9314</a><br><a href="https://success.trendmicro.com/solution/1116672" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">trendmicro -- interscan_web_security_virtual_appliance</td><td style="text-align: left;" align="left">Privilege Escalation Vulnerability in com.trend.iwss.gui.servlet.updateaccountadministration in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to change Master Admin's password and/or add new admin accounts. This was resolved in Version 6.5 CP 1737.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9315&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N)" target="_blank">4.0</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9315" target="_blank">CVE-2016-9315</a><br><a href="https://success.trendmicro.com/solution/1116672" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ytnef_project -- ytnef</td><td style="text-align: left;" align="left">An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "1 of 9. Null Pointer Deref / calloc return value not checked."</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6298&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6298" target="_blank">CVE-2017-6298</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/15/4" target="_blank">MISC</a><br><a href="https://github.com/Yeraze/ytnef/pull/27" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ytnef_project -- ytnef</td><td style="text-align: left;" align="left">An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "2 of 9. Infinite Loop / DoS in the TNEFFillMapi function in lib/ytnef.c."</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6299&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)" target="_blank">4.3</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6299" target="_blank">CVE-2017-6299</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/15/4" target="_blank">MISC</a><br><a href="https://github.com/Yeraze/ytnef/pull/27" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ytnef_project -- ytnef</td><td style="text-align: left;" align="left">An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "3 of 9. Buffer Overflow in version field in lib/tnef-types.h."</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6300&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6300" target="_blank">CVE-2017-6300</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/15/4" target="_blank">MISC</a><br><a href="https://github.com/Yeraze/ytnef/pull/27" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ytnef_project -- ytnef</td><td style="text-align: left;" align="left">An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "4 of 9. Out of Bounds Reads."</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6301&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6301" target="_blank">CVE-2017-6301</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/15/4" target="_blank">MISC</a><br><a href="https://github.com/Yeraze/ytnef/pull/27" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ytnef_project -- ytnef</td><td style="text-align: left;" align="left">An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "5 of 9. Integer Overflow."</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6302&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6302" target="_blank">CVE-2017-6302</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/15/4" target="_blank">MISC</a><br><a href="https://github.com/Yeraze/ytnef/pull/27" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ytnef_project -- ytnef</td><td style="text-align: left;" align="left">An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "6 of 9. Invalid Write and Integer Overflow."</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6303&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6303" target="_blank">CVE-2017-6303</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/15/4" target="_blank">MISC</a><br><a href="https://github.com/Yeraze/ytnef/pull/27" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ytnef_project -- ytnef</td><td style="text-align: left;" align="left">An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "7 of 9. Out of Bounds read."</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6304&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6304" target="_blank">CVE-2017-6304</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/15/4" target="_blank">MISC</a><br><a href="https://github.com/Yeraze/ytnef/pull/27" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ytnef_project -- ytnef</td><td style="text-align: left;" align="left">An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "8 of 9. Out of Bounds read and write."</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6305&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6305" target="_blank">CVE-2017-6305</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/15/4" target="_blank">MISC</a><br><a href="https://github.com/Yeraze/ytnef/pull/27" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ytnef_project -- ytnef</td><td style="text-align: left;" align="left">An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "9 of 9. Directory Traversal using the filename; SanitizeFilename function in settings.c."</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6306&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)" target="_blank">6.8</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6306" target="_blank">CVE-2017-6306</a><br><a href="http://www.openwall.com/lists/oss-security/2017/02/15/4" target="_blank">MISC</a><br><a href="https://github.com/Yeraze/ytnef/pull/27" target="_blank">MISC</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/" target="_blank">MISC</a></td></tr></tbody></table><a href="https://www.us-cert.gov#top">Back to top</a><p><a id="ox-984aebe323-low" name="low" class="mce-item-anchor"></a> </p><h2 id="ox-984aebe323-low_v_title">Low Vulnerabilities</h2><table border="1" summary="Low Vulnerabilities" align="center"><thead><tr><th class="ox-984aebe323-vendor-product" style="width: 24%;" scope="col">Primary<br>Vendor -- Product</th><th style="width: 44%;" scope="col">Description</th><th style="width: 8%;" scope="col">Published</th><th style="width: 4%;" scope="col">CVSS Score</th><th style="width: 10%;" scope="col">Source & Patch Info</th></tr></thead><tbody><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- icloud</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iCloud before 6.1 is affected. The issue involves the "Windows Security" component. It allows local users to obtain sensitive information from iCloud desktop-client process memory via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7614&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7614" target="_blank">CVE-2016-7614</a><br><a href="http://www.securityfocus.com/bid/94911" target="_blank">BID</a><br><a href="https://support.apple.com/HT207424" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. The issue involves the "Contacts" component, which does not prevent an app's Address Book access after access revocation.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4686&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:N)" target="_blank">3.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4686" target="_blank">CVE-2016-4686</a><br><a href="http://www.securityfocus.com/bid/93848" target="_blank">BID</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "SpringBoard" component, which allows physically proximate attackers to maintain the unlocked state via vectors related to Handoff with Siri.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7597&vector=(AV:L/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7597" target="_blank">CVE-2016-7597</a><br><a href="http://www.securityfocus.com/bid/94850" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Accessibility" component, which accepts spoken passwords without considering that they are locally audible.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7634&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7634" target="_blank">CVE-2016-7634</a><br><a href="http://www.securityfocus.com/bid/94850" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Find My iPhone" component, which allows physically proximate attackers to disable this component by bypassing authentication.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7638&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7638" target="_blank">CVE-2016-7638</a><br><a href="http://www.securityfocus.com/bid/94850" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Media Player" component, which allows physically proximate attackers to obtain sensitive photo and contact information by leveraging lockscreen access.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7653&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7653" target="_blank">CVE-2016-7653</a><br><a href="http://www.securityfocus.com/bid/94850" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Accessibility" component. which allows physically proximate attackers to obtain sensitive photo and contact information by leveraging the availability of excessive options during lockscreen access.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7664&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7664" target="_blank">CVE-2016-7664</a><br><a href="http://www.securityfocus.com/bid/94850" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10 is affected. The issue involves the "Springboard" component, which allows physically proximate attackers to obtain sensitive information by viewing application snapshots in the Task Switcher.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7759&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7759" target="_blank">CVE-2016-7759</a><br><a href="https://support.apple.com/HT207143" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Clipboard" component, which allows physically proximate attackers to obtain sensitive information in the lockscreen state by viewing clipboard contents.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7765&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7765" target="_blank">CVE-2016-7765</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- iphone_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the "WiFi" component, which allows physically proximate attackers to bypass the activation-lock protection mechanism and view the home screen via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2351&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2351" target="_blank">CVE-2017-2351</a><br><a href="http://www.securityfocus.com/bid/95722" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. The issue involves the "Security" component. It allows local users to discover lengths of arbitrary passwords by reading a log.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-4670&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4670" target="_blank">CVE-2016-4670</a><br><a href="http://www.securityfocus.com/bid/94433" target="_blank">BID</a><br><a href="https://support.apple.com/HT207271" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207275" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "OpenPAM" component, which allows local users to obtain sensitive information by leveraging mishandling of failed PAM authentication by a sandboxed app.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7600&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7600" target="_blank">CVE-2016-7600</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "IOFireWireFamily" component, which allows local users to obtain sensitive information from kernel memory via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7608&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7608" target="_blank">CVE-2016-7608</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "IOSurface" component. It allows local users to obtain sensitive kernel memory-layout information via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7620&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7620" target="_blank">CVE-2016-7620</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "IOAcceleratorFamily" component. It allows local users to obtain sensitive kernel memory-layout information via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7624&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7624" target="_blank">CVE-2016-7624</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "IOKit" component. It allows local users to obtain sensitive kernel memory-layout information via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7625&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7625" target="_blank">CVE-2016-7625</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "Assets" component, which allows local users to bypass intended permission restrictions and change a downloaded mobile asset via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7628&vector=(AV:L/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7628" target="_blank">CVE-2016-7628</a><br><a href="http://www.securityfocus.com/bid/94903" target="_blank">BID</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "WiFi" component, which allows local users to obtain sensitive network-configuration information by leveraging global storage.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7761&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7761" target="_blank">CVE-2016-7761</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- safari</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. The issue involves the "Safari Reader" component, which allows remote attackers to conduct UXSS attacks via a crafted web site.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7650&vector=(AV:N/AC:H/Au:N/C:N/I:P/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7650" target="_blank">CVE-2016-7650</a><br><a href="http://www.securityfocus.com/bid/94915" target="_blank">BID</a><br><a href="https://support.apple.com/HT207421" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "libarchive" component, which allows local users to write to arbitrary files via vectors related to symlinks.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7619&vector=(AV:L/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7619" target="_blank">CVE-2016-7619</a><br><a href="http://www.securityfocus.com/bid/94905" target="_blank">BID</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "IOKit" component. It allows local users to obtain sensitive kernel memory-layout information via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7714&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7714" target="_blank">CVE-2016-7714</a><br><a href="https://support.apple.com/HT207422" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207423" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- watch_os</td><td style="text-align: left;" align="left">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "Unlock with iPhone" component, which allows attackers to bypass the wrist-presence protection mechanism and unlock a Watch device via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-2352&vector=(AV:L/AC:L/Au:N/C:N/I:P/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2352" target="_blank">CVE-2017-2352</a><br><a href="http://www.securityfocus.com/bid/95730" target="_blank">BID</a><br><a href="https://support.apple.com/HT207482" target="_blank">CONFIRM</a><br><a href="https://support.apple.com/HT207487" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- firepower_management_center</td><td style="text-align: left;" align="left">A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. More Information: CSCvc72741. Known Affected Releases: 6.2.1.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-3847&vector=(AV:N/AC:M/Au:S/C:N/I:P/A:N)" target="_blank">3.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3847" target="_blank">CVE-2017-3847</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-fpmc" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">f5 -- big-ip_application_acceleration_manager</td><td style="text-align: left;" align="left">F5 BIG-IP 12.0.0 and 11.5.0 - 11.6.1 REST requests which timeout during user account authentication may log sensitive attributes such as passwords in plaintext to /var/log/restjavad.0.log. It may allow local users to obtain sensitive information by reading these files.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6249&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6249" target="_blank">CVE-2016-6249</a><br><a href="https://support.f5.com/csp/article/K12685114" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- rational_requirements_composer</td><td style="text-align: left;" align="left">IBM Rational DOORS Next Generation 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1995515.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-6055&vector=(AV:N/AC:M/Au:S/C:N/I:P/A:N)" target="_blank">3.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6055" target="_blank">CVE-2016-6055</a><br><a href="http://www.ibm.com/support/docview.wss?uid=swg21995515" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">intersect_alliance -- snare_epilog</td><td style="text-align: left;" align="left">Cross-site scripting (XSS) vulnerability in InterSect Alliance SNARE Epilog for UNIX version 1.5 allows remote authenticated users to inject arbitrary web script or HTML via the str_log_name parameter in a "Web Admin Portal > Log Configuration > Add" action.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-5998&vector=(AV:N/AC:M/Au:S/C:N/I:P/A:N)" target="_blank">3.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5998" target="_blank">CVE-2017-5998</a><br><a href="http://arthrocyber.com/research" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">mantisbt -- mantisbt</td><td style="text-align: left;" align="left">MantisBT before 1.3.1 and 2.x before 2.0.0-beta.2 uses a weak Content Security Policy when using the Gravatar plugin, which allows remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-17</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-7111&vector=(AV:N/AC:H/Au:N/C:N/I:P/A:N)" target="_blank">2.6</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7111" target="_blank">CVE-2016-7111</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/28/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/08/29/2" target="_blank">MLIST</a><br><a href="https://github.com/mantisbt/mantisbt/commit/b3511d2f" target="_blank">CONFIRM</a><br><a href="https://mantisbt.org/bugs/view.php?id=21263" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">munin-monitoring -- munin</td><td style="text-align: left;" align="left">Munin before 2.999.6 has a local file write vulnerability when CGI graphs are enabled. Setting multiple upper_limit GET parameters allows overwriting any file accessible to the www-data user.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6188&vector=(AV:L/AC:M/Au:N/C:N/I:P/A:N)" target="_blank">1.9</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6188" target="_blank">CVE-2017-6188</a><br><a href="https://bugs.debian.org/855705" target="_blank">CONFIRM</a><br><a href="https://github.com/munin-monitoring/munin/issues/721" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">trendmicro -- interscan_web_security_virtual_appliance</td><td style="text-align: left;" align="left">Multiple stored Cross-Site-Scripting (XSS) vulnerabilities in com.trend.iwss.gui.servlet.updateaccountadministration in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allow authenticated, remote users with least privileges to inject arbitrary HTML/JavaScript code into web pages. This was resolved in Version 6.5 CP 1737.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9316&vector=(AV:N/AC:M/Au:S/C:N/I:P/A:N)" target="_blank">3.5</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9316" target="_blank">CVE-2016-9316</a><br><a href="https://success.trendmicro.com/solution/1116672" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">vce_vision -- intelligent_operations</td><td style="text-align: left;" align="left">The System Library in VCE Vision Intelligent Operations before 2.6.5 does not properly implement cryptography, which makes it easier for local users to discover credentials by leveraging administrative access.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-4056&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4056" target="_blank">CVE-2015-4056</a><br><a href="http://seclists.org/bugtraq/2015/Jun/91" target="_blank">BUGTRAQ</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">wolfssl -- wolfssl</td><td style="text-align: left;" align="left">In versions of wolfSSL before 3.10.2 the function fp_mul_comba makes it easier to extract RSA key information for a malicious user who has access to view cache on a machine.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2017-6076&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6076" target="_blank">CVE-2017-6076</a><br><a href="https://github.com/wolfSSL/wolfssl/releases/tag/v3.10.2-stable" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">xen -- xen</td><td style="text-align: left;" align="left">Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9377&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9377" target="_blank">CVE-2016-9377</a><br><a href="http://www.securityfocus.com/bid/94475" target="_blank">BID</a><br><a href="http://xenbits.xen.org/xsa/advisory-196.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">xen -- xen</td><td style="text-align: left;" align="left">Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9378&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9378" target="_blank">CVE-2016-9378</a><br><a href="http://www.securityfocus.com/bid/94475" target="_blank">BID</a><br><a href="http://xenbits.xen.org/xsa/advisory-196.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">xen -- xen</td><td style="text-align: left;" align="left">Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center"><a href="https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-9384&vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)" target="_blank">2.1</a></td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9384" target="_blank">CVE-2016-9384</a><br><a href="http://www.securityfocus.com/bid/94468" target="_blank">BID</a><br><a href="http://xenbits.xen.org/xsa/advisory-194.html" target="_blank">CONFIRM</a><br><a href="http://xenbits.xen.org/xsa/xsa194.patch" target="_blank">CONFIRM</a></td></tr></tbody></table><a href="https://www.us-cert.gov#top">Back to top</a><p><a id="ox-984aebe323-severity_not_yet_assigned" name="severity_not_yet_assigned" class="mce-item-anchor"></a> </p><h2 id="ox-984aebe323-snya_v_title">Severity Not Yet Assigned</h2><table id="ox-984aebe323-table_severity_not_yet_assigned" border="1" summary="Severity Not Yet Assigned" align="center"><thead><tr><th class="ox-984aebe323-vendor-product" style="width: 24%;" scope="col">Primary<br>Vendor -- Product</th><th style="width: 44%;" scope="col">Description</th><th style="width: 8%;" scope="col">Published</th><th style="width: 4%;" scope="col">CVSS Score</th><th style="width: 10%;" scope="col">Source & Patch Info</th></tr></thead><tbody><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">apple -- mac_os_x<br> </td><td style="text-align: left;" align="left">The installPackage function in the installerHelper subcomponent in Libmacgpg in GPG Suite before 2015.06 allows local users to execute arbitrary commands with root privileges via shell metacharacters in the xmlPath argument.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4677" target="_blank">CVE-2014-4677</a><br><a href="https://bierbaumer.net/security/cve-2014-4677/" target="_blank">MISC</a><br><a href="https://gpgtools.org/releases/gpgsuite/2015.08/release-notes.html" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">bilboplanet -- bilboplanet<br> </td><td style="text-align: left;" align="left">Multiple cross-site scripting (XSS) vulnerabilities in Bilboplanet 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) tribe_name or (2) tags parameter in a tribes page request to user/ or the (3) user_id or (4) fullname parameter to signup.php.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9916" target="_blank">CVE-2014-9916</a><br><a href="http://www.exploit-db.com/exploits/34089" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">cisco -- asyncos_software<br> </td><td style="text-align: left;" align="left">A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA or services scanning content of web access on the WSA. More Information: SCvb91473, CSCvc76500. Known Affected Releases: 10.0.0-203 9.9.9-894 WSA10.0.0-233.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3827" target="_blank">CVE-2017-3827</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-asyncos" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">dell -- vce_vision_intelligent_operations<br> </td><td style="text-align: left;" align="left">The "Plug-in for VMware vCenter" in VCE Vision Intelligent Operations before 2.6.5 sends a cleartext HTTP response upon a request for the Settings screen, which allows remote attackers to discover the admin user password by sniffing the network.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4057" target="_blank">CVE-2015-4057</a><br><a href="http://seclists.org/bugtraq/2015/Jun/91" target="_blank">BUGTRAQ</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ghostscript -- ghostscript<br> </td><td style="text-align: left;" align="left">Multiple use-after-free vulnerabilities in the gx_image_enum_begin function in base/gxipixel.c in Ghostscript before ecceafe3abba2714ef9b432035fe0739d9b1a283 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6196" target="_blank">CVE-2017-6196</a><br><a href="http://git.ghostscript.com/?p=ghostpdl.git;h=ecceafe3abba2714ef9b432035fe0739d9b1a283" target="_blank">CONFIRM</a><br><a href="https://bugs.ghostscript.com/show_bug.cgi?id=697596" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- jazz<br> </td><td style="text-align: left;" align="left">IBM Jazz for Service Management 1.1.2.1 and 1.1.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM Reference #: 1998714.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9975" target="_blank">CVE-2016-9975</a><br><a href="http://www.ibm.com/support/docview.wss?uid=swg21998714" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- rhapsody<br> </td><td style="text-align: left;" align="left">IBM Rhapsody DM 4.0, 5.0 and 6.0 is vulnerable to a denial of service, caused by an XML External Entity Injection (XXE) error when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume all available memory resources. IBM Reference #: 1997798.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8974" target="_blank">CVE-2016-8974</a><br><a href="http://www.ibm.com/support/docview.wss?uid=swg21997798" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- tivoli<br> </td><td style="text-align: left;" align="left">IBM Tivoli Storage Manager Server 7.1 could allow an authenticated user with TSM administrator privileges to cause a buffer overflow using a specially crafted SQL query and execute arbitrary code on the server. IBM Reference #: 1998747.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8998" target="_blank">CVE-2016-8998</a><br><a href="http://www.ibm.com/support/docview.wss?uid=swg21998747" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">ibm -- websphere<br> </td><td style="text-align: left;" align="left">IBM WebSphere MQ 8.0 could allow an authenticated user with authority to create a cluster object to cause a denial of service to MQ clustering. IBM Reference #: 1998647.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9009" target="_blank">CVE-2016-9009</a><br><a href="http://www.ibm.com/support/docview.wss?uid=swg21998647" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">justsystems -- ichitaro_office<br> </td><td style="text-align: left;" align="left">JustSystems Ichitaro 2016 Trial contains a vulnerability that exists when trying to open a specially crafted PowerPoint file. Due to the application incorrectly handling the error case for a function's result, the application will use this result in a pointer calculation for reading file data into. Due to this, the application will read data from the file into an invalid address thus corrupting memory. Under the right conditions, this can lead to code execution under the context of the application.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2791" target="_blank">CVE-2017-2791</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0199/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">justsystems -- ichitaro_office<br> </td><td style="text-align: left;" align="left">When processing a record type of 0x3c from a Workbook stream from an Excel file (.xls), JustSystems Ichitaro Office trusts that the size is greater than zero, subtracts one from the length, and uses this result as the size for a memcpy. This results in a heap-based buffer overflow and can lead to code execution under the context of the application.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2790" target="_blank">CVE-2017-2790</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0197/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">justsystems -- ichitaro_office<br> </td><td style="text-align: left;" align="left">When copying filedata into a buffer, JustSystems Ichitaro Office 2016 Trial will calculate two values to determine how much data to copy from the document. If both of these values are larger than the size of the buffer, the application will choose the smaller of the two and trust it to copy data from the file. This value is larger than the buffer size, which leads to a heap-based buffer overflow. This overflow corrupts an offset in the heap used in pointer arithmetic for writing data and can lead to code execution under the context of the application.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2789" target="_blank">CVE-2017-2789</a><br><a href="http://www.talosintelligence.com/reports/TALOS-2016-0196/" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libdwarf -- libdwarf<br> </td><td style="text-align: left;" align="left">dwarf_form.c in libdwarf 20160115 allows remote attackers to cause a denial of service (crash) via a crafted elf file.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5027" target="_blank">CVE-2016-5027</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/24/1" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/25/1" target="_blank">MLIST</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1330237" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libiberty -- libiberty<br> </td><td style="text-align: left;" align="left">Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "ktypevec."</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4488" target="_blank">CVE-2016-4488</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/05/5" target="_blank">MLIST</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libiberty -- libiberty<br> </td><td style="text-align: left;" align="left">Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "btypevec."</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4487" target="_blank">CVE-2016-4487</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/05/5" target="_blank">MLIST</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libiberty -- libiberty<br> </td><td style="text-align: left;" align="left">Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2226" target="_blank">CVE-2016-2226</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/05/5" target="_blank">MLIST</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libiberty -- libiberty<br> </td><td style="text-align: left;" align="left">Integer overflow in the gnu_special function in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to the "demangling of virtual tables."</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4489" target="_blank">CVE-2016-4489</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/05/5" target="_blank">MLIST</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libiberty -- libiberty<br> </td><td style="text-align: left;" align="left">Integer overflow in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to inconsistent use of the long and int types for lengths.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4490" target="_blank">CVE-2016-4490</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/05/5" target="_blank">MLIST</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libiberty -- libiberty<br> </td><td style="text-align: left;" align="left">Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4492" target="_blank">CVE-2016-4492</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/05/5" target="_blank">MLIST</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926" target="_blank">CONFIRM</a><br><a href="https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html" target="_blank">MLIST</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libiberty -- libiberty<br> </td><td style="text-align: left;" align="left">The demangle_template_value_parm and do_hpacc_template_literal functions in cplus-dem.c in libiberty allow remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted binary.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4493" target="_blank">CVE-2016-4493</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/05/5" target="_blank">MLIST</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926" target="_blank">CONFIRM</a><br><a href="https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html" target="_blank">MLIST</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">libiberty -- libiberty<br> </td><td style="text-align: left;" align="left">The d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once."</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4491" target="_blank">CVE-2016-4491</a><br><a href="http://www.openwall.com/lists/oss-security/2016/05/05/5" target="_blank">MLIST</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909" target="_blank">CONFIRM</a><br><a href="https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html" target="_blank">MLIST</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">microsoft -- windows<br> </td><td style="text-align: left;" align="left">gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to obtain sensitive information from process heap memory via a crafted EMF file, as demonstrated by an EMR_SETDIBITSTODEVICE record with modified Device Independent Bitmap (DIB) dimensions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3216, CVE-2016-3219, and/or CVE-2016-3220.</td><td style="text-align: center;" align="center">2017-02-20</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0038" target="_blank">CVE-2017-0038</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=992" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">opentext -- documentum_content_server<br> </td><td style="text-align: left;" align="left">OpenText Documentum Content Server (formerly EMC Documentum Content Server) 7.3, when PostgreSQL Database is used and return_top_results_row_based config option is false, does not properly restrict DQL hints, which allows remote authenticated users to conduct DQL injection attacks and execute arbitrary DML or DDL commands via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2520.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5585" target="_blank">CVE-2017-5585</a><br><a href="http://packetstormsecurity.com/files/141124/OpenText-Documentum-Content-Server-7.3-SQL-Injection.html" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">opentext -- documentum_d2<br> </td><td style="text-align: left;" align="left">OpenText Documentum D2 (formerly EMC Documentum D2) 4.x allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the BeanShell (bsh) and Apache Commons Collections (ACC) libraries.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5586" target="_blank">CVE-2017-5586</a><br><a href="http://packetstormsecurity.com/files/141105/OpenText-Documentum-D2-4.x-Remote-Code-Execution.html" target="_blank">MISC</a><br><a href="https://www.exploit-db.com/exploits/41366/" target="_blank">EXPLOIT-DB</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">paypal -- paypal<br> </td><td style="text-align: left;" align="left">Cross-site scripting (XSS) vulnerability in GetAuthDetails.html.php in PayPal PHP Merchant SDK (aka merchant-sdk-php) 3.9.1 allows remote attackers to inject arbitrary web script or HTML via the token parameter.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6099" target="_blank">CVE-2017-6099</a><br><a href="https://github.com/paypal/merchant-sdk-php/issues/129" target="_blank">MISC</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">pcsc-lite -- pcsc-lite<br> </td><td style="text-align: left;" align="left">Use-after-free vulnerability in pcsc-lite before 1.8.20 allows a remote attackers to cause denial of service (crash) via a command that uses "cardsList" after the handle has been released through the SCardReleaseContext function.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10109" target="_blank">CVE-2016-10109</a><br><a href="http://www.openwall.com/lists/oss-security/2017/01/03/3" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/95263" target="_blank">BID</a><br><a href="http://www.ubuntu.com/usn/USN-3176-1" target="_blank">UBUNTU</a><br><a href="https://anonscm.debian.org/cgit/pcsclite/PCSC.git/commit/?id=697fe05967af7ea215bcd5d5774be587780c9e22" target="_blank">CONFIRM</a><br><a href="https://lists.alioth.debian.org/pipermail/pcsclite-muscle/Week-of-Mon-20161226/000779.html" target="_blank">MLIST</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">plone -- plone<br> </td><td style="text-align: left;" align="left">Chameleon (five.pt) in Plone 5.0rc1 through 5.1a1 allows remote authenticated users to bypass Restricted Python by leveraging permissions to create or edit templates.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4043" target="_blank">CVE-2016-4043</a><br><a href="http://www.openwall.com/lists/oss-security/2016/04/20/3" target="_blank">MLIST</a><br><a href="https://plone.org/security/hotfix/20160419/bypass-restricted-python" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">plone -- plone<br> </td><td style="text-align: left;" align="left">Plone 4.0 through 5.1a1 does not have security declarations for Dexterity content-related WebDAV requests, which allows remote attackers to gain webdav access via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4041" target="_blank">CVE-2016-4041</a><br><a href="http://www.openwall.com/lists/oss-security/2016/04/20/1" target="_blank">MLIST</a><br><a href="https://plone.org/security/hotfix/20160419/privilege-escalation-in-webdav" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">plone -- plone<br> </td><td style="text-align: left;" align="left">Plone 3.3 through 5.1a1 allows remote attackers to obtain information about the ID of sensitive content via unspecified vectors.</td><td style="text-align: center;" align="center">2017-02-24</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4042" target="_blank">CVE-2016-4042</a><br><a href="http://www.openwall.com/lists/oss-security/2016/04/20/2" target="_blank">MLIST</a><br><a href="https://plone.org/security/hotfix/20160419/unauthorized-disclosure-of-site-content" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">quagga -- quagga<br> </td><td style="text-align: left;" align="left">It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1245" target="_blank">CVE-2016-1245</a><br><a href="http://www.gossamer-threads.com/lists/quagga/users/31952" target="_blank">CONFIRM</a><br><a href="http://www.securityfocus.com/bid/93775" target="_blank">BID</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1386109" target="_blank">CONFIRM</a><br><a href="https://github.com/Quagga/quagga/commit/cfb1fae25f8c092e0d17073eaf7bd428ce1cd546" target="_blank">CONFIRM</a><br><a href="https://www.debian.org/security/2016/dsa-3695" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">siemens -- simatic<br> </td><td style="text-align: left;" align="left">Siemens SIMATIC Logon prior to V1.5 SP3 Update 2 could allow an attacker with knowledge of a valid user name, and physical or network access to the affected system, to bypass the application-level authentication.</td><td style="text-align: center;" align="center">2017-02-21</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2684" target="_blank">CVE-2017-2684</a><br><a href="https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-931064.pdf" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left">teeworlds -- teeworlds<br> </td><td style="text-align: left;" align="left">The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.</td><td style="text-align: center;" align="center">2017-02-22</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9400" target="_blank">CVE-2016-9400</a><br><a href="http://www.openwall.com/lists/oss-security/2016/11/16/8" target="_blank">MLIST</a><br><a href="http://www.openwall.com/lists/oss-security/2016/11/17/8" target="_blank">MLIST</a><br><a href="http://www.securityfocus.com/bid/94381" target="_blank">BID</a><br><a href="https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62" target="_blank">CONFIRM</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C4JNSBXXPE7O32ZMFK7D7YL6EKLG7PRV/" target="_blank">FEDORA</a><br><a href="https://www.teeworlds.com/?page=news&id=12086" target="_blank">CONFIRM</a></td></tr><tr><td class="ox-984aebe323-vendor-product" style="text-align: left;" scope="row" align="left"> radrare -- radrare2<br> </td><td style="text-align: left;" align="left">The r_read_* functions in libr/include/r_endian.h in radare2 1.2.1 allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by the r_read_le32 function.</td><td style="text-align: center;" align="center">2017-02-23</td><td style="width: 5%; text-align: center;" align="center">not yet calculated</td><td><a href="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6197" target="_blank">CVE-2017-6197</a><br><a href="https://github.com/radare/radare2/commit/1ea23bd6040441a21fbcfba69dce9a01af03f989" target="_blank">CONFIRM</a><br><a href="https://github.com/radare/radare2/issues/6816" target="_blank">CONFIRM</a></td></tr></tbody></table><a href="https://www.us-cert.gov#top">Back to top</a><hr><p>This product is provided subject to this <a href="http://www.us-cert.gov/privacy/notification">Notification</a> and this <a href="http://www.us-cert.gov/privacy/">Privacy & Use</a> policy.</p></div></div><hr><table style="border-collapse: collapse; width: 100%;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #757575; font-size: 10px; font-family: Arial;" width="89%" height="60">A copy of this publication is available at <a href="https://www.us-cert.gov">www.us-cert.gov</a>. If you need help or have questions, please send an email to <a href="mailto:info@us-cert.gov">info@us-cert.gov</a>. Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT@ncas.us-cert.gov to your address book.</td></tr></tbody></table><table style="border-collapse: collapse; width: 400px;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #666666; font-family: Arial, sans-serif; font-size: 12px;" valign="bottom" height="24">OTHER RESOURCES:</td></tr><tr><td style="padding: 0px; color: #666666; font-family: Arial, sans-serif; font-size: 12px;" valign="middle" height="24"><a href="http://www.us-cert.gov/contact-us/" target="_blank">Contact Us</a> | <a href="http://www.us-cert.gov/security-publications" target="_blank">Security Publications</a> | <a href="http://www.us-cert.gov/ncas" target="_blank">Alerts and Tips</a> | <a href="http://www.us-cert.gov/related-resources" target="_blank">Related Resources</a></td></tr></tbody></table><table style="border-collapse: collapse; width: 150px;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #666666; font-family: Arial, sans-serif; font-size: 12px;" colspan="7" valign="bottom" height="24">STAY CONNECTED:</td></tr><tr><td width="41" style="padding: 0px;"><a href="http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new"><img src="https://service.govdelivery.com/banners/GOVDELIVERY/SOCIAL_MEDIA/envelope.gif" border="0" alt="Sign up for email updates" width="25" height="25" style="width: 25px; height: 25px;"></a></td></tr></tbody></table><p style="color: #666666; font-family: Arial, sans-serif; font-size: 12px;">SUBSCRIBER SERVICES:<br><a href="http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true" target="_blank">Manage Preferences</a>  |  <a href="https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.b03cc84c90ac58ffb6e970add416fb2d&destination=w3hwn%40arrl.net" target="_blank">Unsubscribe</a>  |  <a href="https://subscriberhelp.govdelivery.com/">Help</a></p><hr><table style="border-collapse: collapse; width: 100%;" border="0" cellspacing="0" cellpadding="0" class="mce-item-table"><tbody><tr><td style="padding: 0px; color: #757575; font-size: 10px; font-family: Arial;" width="89%">This email was sent to w3hwn@arrl.net using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870</td><td align="right" width="11%" style="padding: 0px;"><a href="http://www.govdelivery.com/portals/powered-by" target="_blank"><img src="https://service.govdelivery.com/banners/GOVDELIVERY/logo_gd_poweredby.gif" border="0" alt="Powered by GovDelivery" width="115" height="35" style="width: 115px; height: 35px;"></a></td></tr></tbody></table></td></tr></tbody></table><p></p><blockquote type="cite"></blockquote></body></html>