Search for vulnerabilities
Vulnerability details: VCID-qbz3-r843-aaaf
Vulnerability ID VCID-qbz3-r843-aaaf
Aliases CVE-2016-2183
VC-OPENSSL-20160824-CVE-2016-2183
Summary The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Low http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2183.html
generic_textual Low https://access.redhat.com/articles/2548661
rhas Critical https://access.redhat.com/errata/RHSA-2017:0336
rhas Critical https://access.redhat.com/errata/RHSA-2017:0337
rhas Critical https://access.redhat.com/errata/RHSA-2017:0338
rhas Moderate https://access.redhat.com/errata/RHSA-2017:0462
rhas Important https://access.redhat.com/errata/RHSA-2017:3113
rhas Important https://access.redhat.com/errata/RHSA-2017:3114
rhas Important https://access.redhat.com/errata/RHSA-2017:3240
rhas Moderate https://access.redhat.com/errata/RHSA-2018:2123
rhas Moderate https://access.redhat.com/errata/RHSA-2019:1245
rhas Moderate https://access.redhat.com/errata/RHSA-2019:2859
rhas Moderate https://access.redhat.com/errata/RHSA-2020:0451
rhas Moderate https://access.redhat.com/errata/RHSA-2020:3842
rhas Important https://access.redhat.com/errata/RHSA-2021:0308
rhas Moderate https://access.redhat.com/errata/RHSA-2021:2438
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json
generic_textual Low https://access.redhat.com/security/cve/cve-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.00528 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.03984 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.03984 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40016 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.40603 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.54785 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.54785 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.54785 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.54785 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.54785 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
epss 0.74684 https://api.first.org/data/v1/epss?cve=CVE-2016-2183
generic_textual Low https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
generic_textual Low https://community.qualys.com/thread/16555
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
cvssv2 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
generic_textual Low https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
cvssv3.1 9.8 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
generic_textual CRITICAL https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
cvssv3.1 8.1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
generic_textual HIGH https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
generic_textual Low https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
generic_textual Medium https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2016-2183
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2016-2183
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2016-2183
generic_textual Low https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
archlinux High https://security.archlinux.org/AVG-29
archlinux High https://security.archlinux.org/AVG-30
generic_textual Low https://security-tracker.debian.org/tracker/CVE-2016-2183
generic_textual Low https://sweet32.info/
generic_textual Low https://twitter.com/symantec/status/768786631159603200
generic_textual Medium https://ubuntu.com/security/notices/USN-3087-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3179-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3194-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3198-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3270-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3372-1
cvssv3.1 7.5 https://wiki.opendaylight.org/view/Security_Advisories
generic_textual HIGH https://wiki.opendaylight.org/view/Security_Advisories
generic_textual Low https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
generic_textual Low https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
generic_textual Low https://www.openssl.org/blog/blog/2016/08/24/sweet32/
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuapr2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuapr2020.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujan2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujan2020.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujul2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujul2020.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuoct2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuoct2020.html
cvssv3.1 8.2 https://www.oracle.com/security-alerts/cpuoct2021.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuoct2021.html
cvssv3.1 5.9 https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
generic_textual MODERATE https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
generic_textual Low https://www.sigsac.org/ccs/CCS2016/accepted-papers/
generic_textual Low https://www.suse.com/security/cve/CVE-2016-2183.html
generic_textual Low https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
cvssv3.1 9.8 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
generic_textual CRITICAL http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
cvssv3.1 9.8 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
generic_textual CRITICAL http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
cvssv3.1 8.1 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
cvssv3.1 5.3 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Reference id Reference type URL
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2183.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json
https://access.redhat.com/security/cve/cve-2016-2183
https://api.first.org/data/v1/epss?cve=CVE-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability
https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
ASA-201609-23 https://security.archlinux.org/ASA-201609-23
ASA-201609-24 https://security.archlinux.org/ASA-201609-24
AVG-29 https://security.archlinux.org/AVG-29
AVG-30 https://security.archlinux.org/AVG-30
cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:*
cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
CVE-2016-2183 https://nvd.nist.gov/vuln/detail/CVE-2016-2183
RHBA-2019:2581 https://bugzilla.redhat.com/show_bug.cgi?id=1369383
RHSA-2017:0336 https://access.redhat.com/errata/RHSA-2017:0336
RHSA-2017:0337 https://access.redhat.com/errata/RHSA-2017:0337
RHSA-2017:0338 https://access.redhat.com/errata/RHSA-2017:0338
RHSA-2017:0462 https://access.redhat.com/errata/RHSA-2017:0462
RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3113
RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3114
RHSA-2017:3240 https://access.redhat.com/errata/RHSA-2017:3240
RHSA-2018:2123 https://access.redhat.com/errata/RHSA-2018:2123
RHSA-2019:1245 https://access.redhat.com/errata/RHSA-2019:1245
RHSA-2019:2859 https://access.redhat.com/errata/RHSA-2019:2859
RHSA-2020:0451 https://access.redhat.com/errata/RHSA-2020:0451
RHSA-2020:3842 https://access.redhat.com/errata/RHSA-2020:3842
RHSA-2021:0308 https://access.redhat.com/errata/RHSA-2021:0308
RHSA-2021:2438 https://access.redhat.com/errata/RHSA-2021:2438
USN-3087-1 https://usn.ubuntu.com/3087-1/
USN-3179-1 https://usn.ubuntu.com/3179-1/
USN-3194-1 https://usn.ubuntu.com/3194-1/
USN-3198-1 https://usn.ubuntu.com/3198-1/
USN-3270-1 https://usn.ubuntu.com/3270-1/
USN-3372-1 https://usn.ubuntu.com/3372-1/
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-2183
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-2183
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-2183
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://wiki.opendaylight.org/view/Security_Advisories
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuapr2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujan2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujul2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuoct2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N Found at https://www.oracle.com/security-alerts/cpuoct2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.77478
EPSS Score 0.00528
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.