Search for vulnerabilities
Vulnerability details: VCID-7yqt-a8ht-aaae
Vulnerability ID VCID-7yqt-a8ht-aaae
Aliases CVE-2016-2818
Summary Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2818.html
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
epss 0.01482 https://api.first.org/data/v1/epss?cve=CVE-2016-2818
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1342887
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831
cvssv2 6.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2016-2818
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2016-2818
generic_textual Medium https://ubuntu.com/security/notices/USN-2993-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3023-1
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2016-49
generic_textual Medium https://www.mozilla.org/en-US/security/advisories/mfsa2016-49/
cvssv3.1 8.8 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2818.html
https://access.redhat.com/errata/RHSA-2016:1217
https://access.redhat.com/errata/RHSA-2016:1392
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2818.json
https://api.first.org/data/v1/epss?cve=CVE-2016-2818
https://bugzilla.mozilla.org/show_bug.cgi?id=1234147
https://bugzilla.mozilla.org/show_bug.cgi?id=1256493
https://bugzilla.mozilla.org/show_bug.cgi?id=1256739
https://bugzilla.mozilla.org/show_bug.cgi?id=1256968
https://bugzilla.mozilla.org/show_bug.cgi?id=1261230
https://bugzilla.mozilla.org/show_bug.cgi?id=1261752
https://bugzilla.mozilla.org/show_bug.cgi?id=1263384
https://bugzilla.mozilla.org/show_bug.cgi?id=1264575
https://bugzilla.mozilla.org/show_bug.cgi?id=1265577
https://bugzilla.mozilla.org/show_bug.cgi?id=1267130
https://bugzilla.mozilla.org/show_bug.cgi?id=1269729
https://bugzilla.mozilla.org/show_bug.cgi?id=1273202
https://bugzilla.mozilla.org/show_bug.cgi?id=1273701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://ubuntu.com/security/notices/USN-2993-1
https://ubuntu.com/security/notices/USN-3023-1
https://www.mozilla.org/en-US/security/advisories/mfsa2016-49/
http://www.debian.org/security/2016/dsa-3600
http://www.debian.org/security/2016/dsa-3647
http://www.mozilla.org/security/announce/2016/mfsa2016-49.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91075
http://www.securitytracker.com/id/1036057
http://www.ubuntu.com/usn/USN-2993-1
http://www.ubuntu.com/usn/USN-3023-1
1342887 https://bugzilla.redhat.com/show_bug.cgi?id=1342887
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*
cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
CVE-2016-2818 https://nvd.nist.gov/vuln/detail/CVE-2016-2818
mfsa2016-49 https://www.mozilla.org/en-US/security/advisories/mfsa2016-49
USN-2993-1 https://usn.ubuntu.com/2993-1/
USN-3023-1 https://usn.ubuntu.com/3023-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2016-2818
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-2818
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.5943
EPSS Score 0.00426
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.