Search for vulnerabilities
Vulnerability details: VCID-ryqv-b6d6-r7ed
Vulnerability ID VCID-ryqv-b6d6-r7ed
Aliases CVE-2016-3627
Summary
Status Published
Exploitability 0.5
Weighted Severity 2.1
Risk 1.1
Affected and Fixed Packages Package Details
Weaknesses (4)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3627.json
https://api.first.org/data/v1/epss?cve=CVE-2016-3627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1319829 https://bugzilla.redhat.com/show_bug.cgi?id=1319829
819006 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819006
CVE-2016-3627 https://nvd.nist.gov/vuln/detail/CVE-2016-3627
RHSA-2016:1292 https://access.redhat.com/errata/RHSA-2016:1292
RHSA-2016:2957 https://access.redhat.com/errata/RHSA-2016:2957
USN-2994-1 https://usn.ubuntu.com/2994-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.49584
EPSS Score 0.00263
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:34:46.058047+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/2994-1/ 37.0.0