Search for vulnerabilities
Vulnerability details: VCID-2vwq-s4y4-aaae
Vulnerability ID VCID-2vwq-s4y4-aaae
Aliases CVE-2015-8126
Summary Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual Medium http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
generic_textual MODERATE http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8126.html
rhas Moderate https://access.redhat.com/errata/RHSA-2015:2594
rhas Moderate https://access.redhat.com/errata/RHSA-2015:2595
rhas Moderate https://access.redhat.com/errata/RHSA-2015:2596
rhas Critical https://access.redhat.com/errata/RHSA-2016:0055
rhas Critical https://access.redhat.com/errata/RHSA-2016:0056
rhas Important https://access.redhat.com/errata/RHSA-2016:0057
rhas Critical https://access.redhat.com/errata/RHSA-2016:0098
rhas Critical https://access.redhat.com/errata/RHSA-2016:0099
rhas Critical https://access.redhat.com/errata/RHSA-2016:0100
rhas Critical https://access.redhat.com/errata/RHSA-2016:0101
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02105 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02124 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02124 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02124 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02468 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02813 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02813 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02813 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02813 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02813 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02813 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02813 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02813 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02921 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02921 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02921 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02921 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.02921 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.04296 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.04296 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.04296 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.04296 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05569 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05569 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05569 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05569 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05569 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05569 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05569 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05569 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05713 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05713 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.05713 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.0632 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.0632 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.0632 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.0632 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.0632 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.0632 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.0632 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.07375 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
epss 0.23284 https://api.first.org/data/v1/epss?cve=CVE-2015-8126
generic_textual Medium https://bugzilla.mozilla.org/show_bug.cgi?id=1224244#c0
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1281756
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845
cvssv2 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2015-8126
generic_textual HIGH https://support.apple.com/HT206167
generic_textual Low https://ubuntu.com/security/notices/USN-2815-1
generic_textual Medium http://www.openwall.com/lists/oss-security/2015/11/12/2
cvssv3.1 7.5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Reference id Reference type URL
http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172324.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172769.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172797.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172823.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177344.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177382.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174905.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174936.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175073.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html
http://lists.opensuse.org/opensuse-updates/2015-11/msg00159.html
http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00062.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00063.html
http://lists.opensuse.org/opensuse-updates/2016-01/msg00028.html
http://lists.opensuse.org/opensuse-updates/2016-01/msg00029.html
http://lists.opensuse.org/opensuse-updates/2016-01/msg00030.html
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8126.html
http://rhn.redhat.com/errata/RHSA-2015-2594.html
http://rhn.redhat.com/errata/RHSA-2015-2595.html
http://rhn.redhat.com/errata/RHSA-2015-2596.html
http://rhn.redhat.com/errata/RHSA-2016-0055.html
http://rhn.redhat.com/errata/RHSA-2016-0056.html
http://rhn.redhat.com/errata/RHSA-2016-0057.html
https://access.redhat.com/errata/RHSA-2016:1430
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8126.json
https://api.first.org/data/v1/epss?cve=CVE-2015-8126
https://bugzilla.mozilla.org/show_bug.cgi?id=1224244#c0
https://code.google.com/p/chromium/issues/detail?id=560291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://kc.mcafee.com/corporate/index?page=content&id=SB10148
https://security.gentoo.org/glsa/201603-09
https://security.gentoo.org/glsa/201611-08
https://support.apple.com/HT206167
https://ubuntu.com/security/notices/USN-2815-1
http://www.debian.org/security/2015/dsa-3399
http://www.debian.org/security/2016/dsa-3507
http://www.openwall.com/lists/oss-security/2015/11/12/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/77568
http://www.securitytracker.com/id/1034142
http://www.ubuntu.com/usn/USN-2815-1
1281756 https://bugzilla.redhat.com/show_bug.cgi?id=1281756
805113 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=805113
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update65:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update65:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update65:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update65:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
CVE-2015-8126 https://nvd.nist.gov/vuln/detail/CVE-2015-8126
RHSA-2015:2594 https://access.redhat.com/errata/RHSA-2015:2594
RHSA-2015:2595 https://access.redhat.com/errata/RHSA-2015:2595
RHSA-2015:2596 https://access.redhat.com/errata/RHSA-2015:2596
RHSA-2016:0055 https://access.redhat.com/errata/RHSA-2016:0055
RHSA-2016:0056 https://access.redhat.com/errata/RHSA-2016:0056
RHSA-2016:0057 https://access.redhat.com/errata/RHSA-2016:0057
RHSA-2016:0098 https://access.redhat.com/errata/RHSA-2016:0098
RHSA-2016:0099 https://access.redhat.com/errata/RHSA-2016:0099
RHSA-2016:0100 https://access.redhat.com/errata/RHSA-2016:0100
RHSA-2016:0101 https://access.redhat.com/errata/RHSA-2016:0101
USN-2815-1 https://usn.ubuntu.com/2815-1/
No exploits are available.
Vector: AV:L/AC:L/Au:S/C:P/I:P/A:P Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2015-8126
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.89460
EPSS Score 0.02105
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.