Search for vulnerabilities
Vulnerability details: VCID-9zh6-kkdu-dufa
Vulnerability ID VCID-9zh6-kkdu-dufa
Aliases CVE-2016-7527
Summary
Status Published
Exploitability 0.5
Weighted Severity 3.6
Risk 1.8
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 4.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7527.json
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
epss 0.00995 https://api.first.org/data/v1/epss?cve=CVE-2016-7527
cvssv2 7.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7527.json
https://api.first.org/data/v1/epss?cve=CVE-2016-7527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7540
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1378759 https://bugzilla.redhat.com/show_bug.cgi?id=1378759
832482 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832482
USN-3131-1 https://usn.ubuntu.com/3131-1/
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7527.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.76012
EPSS Score 0.00995
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:39:29.701469+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/3131-1/ 37.0.0