Search for vulnerabilities
Vulnerability details: VCID-vjdt-sa77-b7cf
Vulnerability ID VCID-vjdt-sa77-b7cf
Aliases CVE-2016-9452
GHSA-jpj8-49hr-wcwv
Summary Drupal Denial of service via transliterate mechanism The transliterate mechanism in Drupal 8.x before 8.2.3 allows remote attackers to cause a denial of service via a crafted URL.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2016-9452
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-jpj8-49hr-wcwv
cvssv3.1 6.5 https://github.com/drupal/core
generic_textual MODERATE https://github.com/drupal/core
cvssv3.1 6.5 https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2016-9452.yaml
generic_textual MODERATE https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2016-9452.yaml
cvssv3.1 6.5 https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2016-9452.yaml
generic_textual MODERATE https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2016-9452.yaml
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2016-9452
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2016-9452
archlinux Medium https://security.archlinux.org/AVG-74
cvssv3.1 6.5 https://www.drupal.org/SA-CORE-2016-005
generic_textual MODERATE https://www.drupal.org/SA-CORE-2016-005
cvssv3.1 6.5 http://www.securityfocus.com/bid/94367
generic_textual MODERATE http://www.securityfocus.com/bid/94367
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://github.com/drupal/core
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2016-9452.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2016-9452.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-9452
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://www.drupal.org/SA-CORE-2016-005
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://www.securityfocus.com/bid/94367
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.73038
EPSS Score 0.00796
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:05:44.963955+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-jpj8-49hr-wcwv/GHSA-jpj8-49hr-wcwv.json 37.0.0