Search for vulnerabilities
Vulnerability details: VCID-hbwd-7s88-dyfn
Vulnerability ID VCID-hbwd-7s88-dyfn
Aliases CVE-2016-0800
Summary SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
Status Published
Exploitability 2.0
Weighted Severity 0.8
Risk 1.6
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Metasploit
Description Check if a server supports a given version of SSL/TLS and cipher suites. The certificate is stored in loot, and any known vulnerabilities against that SSL version and cipher suite combination are checked. These checks include POODLE, deprecated protocols, expired/not valid certs, low key strength, null cipher suites, certificates signed with MD5, DROWN, RC4 ciphers, exportable ciphers, LOGJAM, and BEAST.
Note
{}
Ransomware campaign use Unknown
Source publication date Oct. 14, 2014
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/ssl/ssl_version.rb
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.99538
EPSS Score 0.89469
Published At Aug. 3, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T11:01:17.502429+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0800.json 37.0.0