Search for vulnerabilities
Vulnerability details: VCID-9gmp-54ku-mqhx
Vulnerability ID VCID-9gmp-54ku-mqhx
Aliases CVE-2016-2563
Summary
Status Published
Exploitability 2.0
Weighted Severity 3.4
Risk 6.8
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Exploit-DB
Date added March 10, 2016
Description Putty pscp 0.66 - Stack Buffer Overwrite
Ransomware campaign use Unknown
Source publication date March 10, 2016
Exploit type dos
Platform multiple
Source update date Jan. 11, 2018
Source URL https://github.com/tintinweb/pub/tree/999963dfda3f90f96687272d914967f2364a6651/pocs/cve-2016-2563
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.95
EPSS Score 0.1837
Published At Aug. 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T11:54:22.765526+00:00 EPSS Importer Import https://epss.cyentia.com/epss_scores-current.csv.gz 37.0.0