WAFPlanet

CVE Database - 2016

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

1470
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2016-6858

MEDIUM
5.40 CVSS 3.0

Cross-site scripting (XSS) vulnerability in the Create Employee feature in Hybris Management Console (HMC) in SAP Hybris before 5.0.4.11, 5.1.0.x before 5.1.0.11, 5.1.1.x before 5.1.1.12, 5.2.0.x and 5.3.0.x before 5.3.0.10, 5.4.x before 5.4.0.9, 5.5.0.x before 5.5.0.9, 5.5.1.x before 5.5.1.10, 5.6.x before 5.6.0.8, and 5.7.x before 5.7.0.9 allows remote authenticated users to inject arbitrary web script or HTML via the Name field.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-6857

MEDIUM
5.40 CVSS 3.0

Cross-site scripting (XSS) vulnerability in the Create Catalogue feature in Hybris Management Console (HMC) in SAP Hybris before 5.2.0.13, 5.3.x before 5.3.0.11, 5.4.x before 5.4.0.11, 5.5.0.x before 5.5.0.10, 5.5.1.x before 5.5.1.11, 5.6.x before 5.6.0.11, and 5.7.x before 5.7.0.15 allows remote authenticated users to inject arbitrary web script or HTML via the ID field.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-6856

MEDIUM
6.10 CVSS 3.0

Cross-site scripting (XSS) vulnerability in the Inbox Search feature in Hybris Management Console (HMC) in SAP Hybris before 6.0 allows remote attackers to inject arbitrary web script or HTML via the itemsperpage parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-10074

CRITICAL
9.80 CVSS 3.0

The mail transport (aka Swift_Transport_MailTransport) in Swift Mailer before 5.4.5 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address in the (1) From, (2) ReturnPath, or (3) Sender header.

Command Injection
WAF: High

CVE-2016-10045

CRITICAL
9.80 CVSS 3.1

The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.

Command Injection
WAF: High

CVE-2016-10034

CRITICAL
9.80 CVSS 3.0

The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address.

Command Injection
WAF: High

CVE-2016-10083

MEDIUM
6.10 CVSS 3.0

Cross-site scripting (XSS) vulnerability in admin/plugin.php in Piwigo through 2.8.3 allows remote attackers to inject arbitrary web script or HTML via a crafted filename that is mishandled in a certain error case.

Cross-Site Scripting (XSS)
WAF: High

CVE-2015-8744

MEDIUM
5.50 CVSS 3.1

QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.

Improper Input Validation
WAF: Medium

CVE-2016-9891

MEDIUM
5.40 CVSS 3.0

Cross-site scripting (XSS) vulnerability in admin/media.php and admin/media_item.php in Dotclear before 2.11 allows remote authenticated users to inject arbitrary web script or HTML via the upfiletitle or media_title parameter (aka the media title).

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-9878

HIGH
7.50 CVSS 3.0

An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks.

Path Traversal
WAF: High

CVE-2016-7463

MEDIUM
5.40 CVSS 3.0

Cross-site scripting (XSS) vulnerability in the Host Client in VMware vSphere Hypervisor (aka ESXi) 5.5 and 6.0 allows remote authenticated users to inject arbitrary web script or HTML via a crafted VM.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-7460

CRITICAL
9.10 CVSS 3.0

The Single Sign-On feature in VMware vCenter Server 5.5 before U3e and 6.0 before U2a and vRealize Automation 6.x before 6.2.5 allows remote attackers to read arbitrary files or cause a denial of service via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

XML External Entity (XXE)
WAF: High

CVE-2016-7459

HIGH
7.70 CVSS 3.0

VMware vCenter Server 5.5 before U3e and 6.0 before U2a allows remote authenticated users to read arbitrary files via a (1) Log Browser, (2) Distributed Switch setup, or (3) Content Library XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

XML External Entity (XXE)
WAF: High

CVE-2016-7458

MEDIUM
5.80 CVSS 3.0

VMware vSphere Client 5.5 before U3e and 6.0 before U2a allows remote vCenter Server and ESXi instances to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

XML External Entity (XXE)
WAF: High

CVE-2016-7087

MEDIUM
5.30 CVSS 3.0

Directory traversal vulnerability in the Connection Server in VMware Horizon View 5.x before 5.3.7, 6.x before 6.2.3, and 7.x before 7.0.1 allows remote attackers to obtain sensitive information via unspecified vectors.

Path Traversal
WAF: High

CVE-2016-9685

MEDIUM
5.50 CVSS 3.0

Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2016-6213

MEDIUM
4.70 CVSS 3.0

fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2016-10072

HIGH
7.50 CVSS 3.0

WampServer 3.0.6 has two files called 'wampmanager.exe' and 'unins000.exe' with a weak ACL for Modify. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. To properly exploit this vulnerability, the local attacker must insert an executable file called wampmanager.exe or unins000.exe and replace the original files. The next time one of these programs is launched by a more privileged user, malicious code chosen by the local attacker will run. NOTE: the vendor disputes the relevance of this report, taking the position that a configuration in which "'someone' (an attacker) is able to replace files on a PC" is not "the fault of WampServer.

Code Injection
WAF: Medium

CVE-2016-9224

MEDIUM
6.50 CVSS 3.0

A vulnerability in the Cisco Jabber Guest Server could allow an unauthenticated, remote attacker to initiate connections to arbitrary hosts. More Information: CSCvc31635. Known Affected Releases: 10.6(9). Known Fixed Releases: 11.0(0).

Improper Input Validation
WAF: Medium

CVE-2016-9681

MEDIUM
5.40 CVSS 3.0

Multiple cross-site scripting (XSS) vulnerabilities in Serendipity before 2.0.5 allow remote authenticated users to inject arbitrary web script or HTML via a category or directory name.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-10006

MEDIUM
6.10 CVSS 3.1

In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-10039

HIGH
7.30 CVSS 3.1

Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/getfiles.

Path Traversal
WAF: High

CVE-2016-10038

HIGH
7.30 CVSS 3.0

Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/remove.

Path Traversal
WAF: High

CVE-2016-10037

HIGH
7.30 CVSS 3.1

Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted id (aka dir) parameter, related to browser/directory/getlist.

Path Traversal
WAF: High

CVE-2016-7968

MEDIUM
6.50 CVSS 3.0

KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. HTML Mail contents were not sanitized for JavaScript and included code was executed.

Code Injection
WAF: Medium

CVE-2016-7967

HIGH
8.10 CVSS 3.0

KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. Since the generated html is executed in the local file security context by default access to remote and local URLs was enabled.

Code Injection
WAF: Medium

CVE-2016-7966

HIGH
7.30 CVSS 3.0

Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.

Code Injection
WAF: Medium

CVE-2016-7787

MEDIUM
4.90 CVSS 3.0

A maliciously crafted command line for kdesu can result in the user only seeing part of the commands that will actually get executed as super user.

Code Injection
WAF: Medium

CVE-2016-9889

MEDIUM
6.10 CVSS 3.0

Some forms with the parameter geo_zoomlevel_to_found_location in Tiki Wiki CMS 12.x before 12.10 LTS, 15.x before 15.3 LTS, and 16.x before 16.1 don't have the input sanitized, related to tiki-setup.php and article_image.php. The impact is XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-8595

MEDIUM
5.50 CVSS 3.0

The gsm_parse function in libavcodec/gsm_parser.c in FFmpeg before 3.1.5 allows remote attackers to cause a denial of service (assert fault) via a crafted AVI file.

Improper Input Validation
WAF: Medium

CVE-2016-7785

MEDIUM
5.50 CVSS 3.0

The avi_read_seek function in libavformat/avidec.c in FFmpeg before 3.1.4 allows remote attackers to cause a denial of service (assert fault) via a crafted AVI file.

Improper Input Validation
WAF: Medium

CVE-2016-6659

HIGH
8.10 CVSS 3.0

Cloud Foundry before 248; UAA 2.x before 2.7.4.12, 3.x before 3.6.5, and 3.7.x through 3.9.x before 3.9.3; and UAA bosh release (aka uaa-release) before 13.9 for UAA 3.6.5 and before 24 for UAA 3.9.3 allow attackers to gain privileges by accessing UAA logs and subsequently running a specially crafted application that interacts with a configured SAML provider.

Improper Authentication
WAF: Low

CVE-2016-7954

CRITICAL
9.80 CVSS 3.0

Bundler 1.x might allow remote attackers to inject arbitrary Ruby code into an application by leveraging a gem name collision on a secondary source. NOTE: this might overlap CVE-2013-0334.

Code Injection
WAF: Medium

CVE-2016-9181

HIGH
7.10 CVSS 3.0

perl-Image-Info: When parsing an SVG file, external entity expansion (XXE) was not disabled. An attacker could craft an SVG file which, when processed by an application using perl-Image-Info, could cause denial of service or, potentially, information disclosure.

XML External Entity (XXE)
WAF: High

CVE-2016-9180

CRITICAL
9.10 CVSS 3.0

perl-XML-Twig: The option to `expand_external_ents`, documented as controlling external entity expansion in XML::Twig does not work. External entities are always expanded, regardless of the option's setting.

XML External Entity (XXE)
WAF: High

CVE-2016-9179

HIGH
7.50 CVSS 3.0

lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.

Improper Input Validation
WAF: Medium

CVE-2016-5851

HIGH
8.80 CVSS 3.1

python-docx before 0.8.6 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted document.

XML External Entity (XXE)
WAF: High

CVE-2016-9757

MEDIUM
5.40 CVSS 3.0

In the Create Tags page of the Rapid7 Nexpose version 6.4.12 user interface, any authenticated user who has the capability to create tags can inject cross-site scripting (XSS) elements in the tag name field. Once this tag is viewed in the Tag Detail page of the Rapid7 Nexpose 6.4.12 UI by another authenticated user, the script is run in that user's browser context.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-5303

MEDIUM
6.10 CVSS 3.0

Cross-site scripting (XSS) vulnerability in the Horde Text Filter API in Horde Groupware and Horde Groupware Webmail Edition before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via crafted data:text/html content in a form (1) action or (2) xlink attribute.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-4552

MEDIUM
6.10 CVSS 3.0

Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1.2.0 allows remote attackers to inject arbitrary web script or HTML via the href attribute in an area tag in an e-mail message.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-7282

MEDIUM
6.10 CVSS 3.0

Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 and Microsoft Edge allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Browser Information Disclosure Vulnerability."

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-7280

MEDIUM
6.10 CVSS 3.0

Cross-site scripting (XSS) vulnerability in Microsoft Edge allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Edge Information Disclosure Vulnerability," a different vulnerability than CVE-2016-7206.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-7267

MEDIUM
5.50 CVSS 3.0

Microsoft Excel 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016 misparses file formats, which makes it easier for remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Security Feature Bypass Vulnerability."

Improper Input Validation
WAF: Medium

CVE-2016-7266

HIGH
7.80 CVSS 3.0

Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, and Excel 2016 for Mac mishandle a registry check, which allows user-assisted remote attackers to execute arbitrary commands via crafted embedded content in a document, aka "Microsoft Office Security Feature Bypass Vulnerability."

Improper Input Validation
WAF: Medium

CVE-2016-7206

MEDIUM
6.10 CVSS 3.0

Cross-site scripting (XSS) vulnerability in Microsoft Edge allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Edge Information Disclosure Vulnerability," a different vulnerability than CVE-2016-7280.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-2355

CRITICAL
9.80 CVSS 3.0

SQL injection vulnerability in the REST API in dotCMS before 3.3.2 allows remote attackers to execute arbitrary SQL commands via the stName parameter to api/content/save/1.

SQL Injection
WAF: High

CVE-2016-5193

MEDIUM
4.30 CVSS 3.0

Google Chrome prior to 54.0 for iOS had insufficient validation of URLs for windows open by DOM, which allowed a remote attacker to bypass restrictions on navigation to certain URL schemes via crafted HTML pages.

Improper Input Validation
WAF: Medium

CVE-2016-5191

MEDIUM
6.10 CVSS 3.0

Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo and scheme in an http://javascript:[email protected] URL.

Cross-Site Scripting (XSS)
WAF: High

CVE-2016-5188

MEDIUM
4.30 CVSS 3.0

Multiple issues in Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux allow a remote attacker to spoof various parts of browser UI via crafted HTML pages.

Improper Input Validation
WAF: Medium

CVE-2016-5187

MEDIUM
6.50 CVSS 3.0

Google Chrome prior to 54.0.2840.85 for Android incorrectly handled rapid transition into and out of full screen mode, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages.

Improper Input Validation
WAF: Medium
Page 1 of 30 (1470 CVEs)