Search for vulnerabilities
Vulnerability details: VCID-s9fq-hc6s-aaad
Vulnerability ID VCID-s9fq-hc6s-aaad
Aliases CVE-2009-0217
GHSA-8hfm-837h-hjg5
Summary XML signature HMAC truncation authentication bypass This package uses a parameter that defines an HMAC truncation length (`HMACOutputLength`) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual MODERATE http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html
generic_textual MODERATE http://marc.info/?l=bugtraq&m=125787273209737&w=2
rhas Critical https://access.redhat.com/errata/RHSA-2009:1200
rhas Important https://access.redhat.com/errata/RHSA-2009:1201
rhas Moderate https://access.redhat.com/errata/RHSA-2009:1428
rhas Moderate https://access.redhat.com/errata/RHSA-2009:1636
rhas Moderate https://access.redhat.com/errata/RHSA-2009:1637
rhas Moderate https://access.redhat.com/errata/RHSA-2009:1649
rhas Moderate https://access.redhat.com/errata/RHSA-2009:1650
rhas Critical https://access.redhat.com/errata/RHSA-2009:1694
rhas Low https://access.redhat.com/errata/RHSA-2010:0043
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.34983 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.46578 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.97039 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.97039 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.97241 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.97241 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.97241 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.97241 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
epss 0.97281 https://api.first.org/data/v1/epss?cve=CVE-2009-0217
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=511915
generic_textual MODERATE https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041
generic_textual MODERATE http://secunia.com/advisories/36162
generic_textual MODERATE http://secunia.com/advisories/36176
generic_textual MODERATE http://secunia.com/advisories/36180
generic_textual MODERATE http://secunia.com/advisories/37300
generic_textual MODERATE http://secunia.com/advisories/37671
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-8hfm-837h-hjg5
generic_textual MODERATE https://gitlab.gnome.org/Archive/xmlsec/-/commit/34b349675af9f72eb822837a8772cc1ead7115c7
generic_textual MODERATE https://issues.apache.org/bugzilla/show_bug.cgi?id=47526
generic_textual MODERATE https://issues.apache.org/bugzilla/show_bug.cgi?id=47527
generic_textual MODERATE https://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html
generic_textual MODERATE https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html
generic_textual MODERATE https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html
generic_textual MODERATE https://marc.info/?l=bugtraq&m=125787273209737&w=2
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2009-0217
generic_textual MODERATE https://rhn.redhat.com/errata/RHSA-2009-1200.html
generic_textual MODERATE https://rhn.redhat.com/errata/RHSA-2009-1201.html
generic_textual MODERATE https://rhn.redhat.com/errata/RHSA-2009-1428.html
generic_textual MODERATE https://rhn.redhat.com/errata/RHSA-2009-1636.html
generic_textual MODERATE https://rhn.redhat.com/errata/RHSA-2009-1637.html
generic_textual MODERATE https://rhn.redhat.com/errata/RHSA-2009-1649.html
generic_textual MODERATE https://rhn.redhat.com/errata/RHSA-2009-1650.html
generic_textual MODERATE https://svn.apache.org/viewvc?revision=794013&view=revision
generic_textual MODERATE http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1
generic_textual MODERATE https://www.debian.org/security/2010/dsa-1995
generic_textual MODERATE https://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
generic_textual MODERATE https://www.kb.cert.org/vuls/id/466161
generic_textual MODERATE https://www.kb.cert.org/vuls/id/MAPG-7TSKXQ
generic_textual MODERATE https://www.kb.cert.org/vuls/id/WDON-7TY529
generic_textual MODERATE https://www.mandriva.com/security/advisories?name=MDVSA-2009:209
generic_textual MODERATE https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html
generic_textual MODERATE https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html
generic_textual MODERATE https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html
generic_textual MODERATE https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html
generic_textual MODERATE https://www.redhat.com/support/errata/RHSA-2009-1694.html
generic_textual MODERATE https://www.ubuntu.com/usn/USN-903-1
generic_textual MODERATE https://www.us-cert.gov/cas/techalerts/TA09-294A.html
generic_textual MODERATE https://www.w3.org/2008/06/xmldsigcore-errata.html#e03
generic_textual MODERATE https://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html
generic_textual MODERATE http://www.mandriva.com/security/advisories?name=MDVSA-2009:209
cvssv3.1 5.3 http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
generic_textual MODERATE http://www.us-cert.gov/cas/techalerts/TA09-294A.html
generic_textual MODERATE http://www.us-cert.gov/cas/techalerts/TA10-159B.html
cvssv3.1 5.3 http://www.vupen.com/english/advisories/2009/1900
generic_textual MODERATE http://www.vupen.com/english/advisories/2009/1900
generic_textual MODERATE http://www.vupen.com/english/advisories/2009/2543
Reference id Reference type URL
http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161
http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7
http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7
http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html
http://marc.info/?l=bugtraq&m=125787273209737&w=2
http://osvdb.org/55895
http://osvdb.org/55907
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0217.json
https://api.first.org/data/v1/epss?cve=CVE-2009-0217
https://bugzilla.redhat.com/show_bug.cgi?id=511915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041
http://secunia.com/advisories/34461
http://secunia.com/advisories/35776
http://secunia.com/advisories/35852
http://secunia.com/advisories/35853
http://secunia.com/advisories/35854
http://secunia.com/advisories/35855
http://secunia.com/advisories/35858
http://secunia.com/advisories/36162
http://secunia.com/advisories/36176
http://secunia.com/advisories/36180
http://secunia.com/advisories/36494
http://secunia.com/advisories/37300
http://secunia.com/advisories/37671
http://secunia.com/advisories/37841
http://secunia.com/advisories/38567
http://secunia.com/advisories/38568
http://secunia.com/advisories/38695
http://secunia.com/advisories/38921
http://secunia.com/advisories/41818
http://secunia.com/advisories/60799
https://gitlab.gnome.org/Archive/xmlsec/-/commit/34b349675af9f72eb822837a8772cc1ead7115c7
https://issues.apache.org/bugzilla/show_bug.cgi?id=47526
https://issues.apache.org/bugzilla/show_bug.cgi?id=47527
https://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html
https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html
https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html
https://marc.info/?l=bugtraq&m=125787273209737&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717
https://rhn.redhat.com/errata/RHSA-2009-1200.html
https://rhn.redhat.com/errata/RHSA-2009-1201.html
https://rhn.redhat.com/errata/RHSA-2009-1428.html
https://rhn.redhat.com/errata/RHSA-2009-1636.html
https://rhn.redhat.com/errata/RHSA-2009-1637.html
https://rhn.redhat.com/errata/RHSA-2009-1649.html
https://rhn.redhat.com/errata/RHSA-2009-1650.html
https://svn.apache.org/viewvc?revision=794013&view=revision
http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1
https://usn.ubuntu.com/826-1/
http://svn.apache.org/viewvc?revision=794013&view=revision
http://svn.apache.org/viewvc?view=revision&revision=794013
https://www.debian.org/security/2010/dsa-1995
https://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
https://www.kb.cert.org/vuls/id/466161
https://www.kb.cert.org/vuls/id/MAPG-7TSKXQ
https://www.kb.cert.org/vuls/id/WDON-7TY529
https://www.mandriva.com/security/advisories?name=MDVSA-2009:209
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html
https://www.redhat.com/support/errata/RHSA-2009-1694.html
https://www.ubuntu.com/usn/USN-903-1
https://www.us-cert.gov/cas/techalerts/TA09-294A.html
https://www.w3.org/2008/06/xmldsigcore-errata.html#e03
https://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html
http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023545&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere
http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023723&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere
http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925
http://www.aleksey.com/xmlsec/
http://www.debian.org/security/2010/dsa-1995
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
http://www.kb.cert.org/vuls/id/466161
http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ
http://www.kb.cert.org/vuls/id/WDON-7TY529
http://www.mandriva.com/security/advisories?name=MDVSA-2009:209
http://www.mono-project.com/Vulnerabilities
http://www.openoffice.org/security/cves/CVE-2009-0217.html
http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html
http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
http://www.redhat.com/support/errata/RHSA-2009-1694.html
http://www.securityfocus.com/bid/35671
http://www.securitytracker.com/id?1022561
http://www.securitytracker.com/id?1022567
http://www.securitytracker.com/id?1022661
http://www.ubuntu.com/usn/USN-903-1
http://www.us-cert.gov/cas/techalerts/TA09-294A.html
http://www.us-cert.gov/cas/techalerts/TA10-159B.html
http://www.vupen.com/english/advisories/2009/1900
http://www.vupen.com/english/advisories/2009/1908
http://www.vupen.com/english/advisories/2009/1909
http://www.vupen.com/english/advisories/2009/1911
http://www.vupen.com/english/advisories/2009/2543
http://www.vupen.com/english/advisories/2009/3122
http://www.vupen.com/english/advisories/2010/0366
http://www.vupen.com/english/advisories/2010/0635
http://www.w3.org/2008/06/xmldsigcore-errata.html#e03
http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html
542210 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542210
cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2.33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2.33:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:fp17:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:fp17:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mono_project:mono:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mono_project:mono:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mono_project:mono:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mono_project:mono:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:mono_project:mono:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mono_project:mono:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:mono_project:mono:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mono_project:mono:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:mono_project:mono:1.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mono_project:mono:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:mono_project:mono:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mono_project:mono:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:mono_project:mono:1.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mono_project:mono:1.9:*:*:*:*:*:*:*
cpe:2.3:a:mono_project:mono:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mono_project:mono:2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:application_server:10.1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.4.3im:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:application_server:10.1.4.3im:*:*:*:*:*:*:*
cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*
cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*
cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server_component:10.0:mp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server_component:10.0:mp1:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server_component:10.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server_component:10.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server_component:8.1:sp6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server_component:8.1:sp6:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server_component:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server_component:9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server_component:9.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server_component:9.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server_component:9.2:mp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server_component:9.2:mp3:*:*:*:*:*:*
CVE-2009-0217 https://bugzilla.redhat.com/CVE-2009-0217
CVE-2009-0217 https://nvd.nist.gov/vuln/detail/CVE-2009-0217
GHSA-8hfm-837h-hjg5 https://github.com/advisories/GHSA-8hfm-837h-hjg5
GLSA-201206-13 https://security.gentoo.org/glsa/201206-13
GLSA-201408-19 https://security.gentoo.org/glsa/201408-19
RHSA-2009:1200 https://access.redhat.com/errata/RHSA-2009:1200
RHSA-2009:1201 https://access.redhat.com/errata/RHSA-2009:1201
RHSA-2009:1428 https://access.redhat.com/errata/RHSA-2009:1428
RHSA-2009:1636 https://access.redhat.com/errata/RHSA-2009:1636
RHSA-2009:1637 https://access.redhat.com/errata/RHSA-2009:1637
RHSA-2009:1649 https://access.redhat.com/errata/RHSA-2009:1649
RHSA-2009:1650 https://access.redhat.com/errata/RHSA-2009:1650
RHSA-2009:1694 https://access.redhat.com/errata/RHSA-2009:1694
RHSA-2010:0043 https://access.redhat.com/errata/RHSA-2010:0043
USN-814-1 https://usn.ubuntu.com/814-1/
USN-903-1 https://usn.ubuntu.com/903-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2009-0217
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at http://www.vupen.com/english/advisories/2009/1900
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.96685
EPSS Score 0.34983
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.