Search for vulnerabilities
Vulnerability details: VCID-ywrp-89aa-aaaf
Vulnerability ID VCID-ywrp-89aa-aaaf
Aliases CVE-2016-2512
GHSA-pw27-w7w4-9qc7
PYSEC-2016-15
Summary The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2512.html
cvssv3.1 3.1 http://rhn.redhat.com/errata/RHSA-2016-0502.html
generic_textual LOW http://rhn.redhat.com/errata/RHSA-2016-0502.html
cvssv3.1 3.1 http://rhn.redhat.com/errata/RHSA-2016-0504.html
generic_textual LOW http://rhn.redhat.com/errata/RHSA-2016-0504.html
cvssv3.1 3.1 http://rhn.redhat.com/errata/RHSA-2016-0505.html
generic_textual LOW http://rhn.redhat.com/errata/RHSA-2016-0505.html
cvssv3.1 3.1 http://rhn.redhat.com/errata/RHSA-2016-0506.html
generic_textual LOW http://rhn.redhat.com/errata/RHSA-2016-0506.html
rhas Moderate https://access.redhat.com/errata/RHSA-2016:0502
rhas Moderate https://access.redhat.com/errata/RHSA-2016:0503
rhas Moderate https://access.redhat.com/errata/RHSA-2016:0504
rhas Moderate https://access.redhat.com/errata/RHSA-2016:0505
rhas Moderate https://access.redhat.com/errata/RHSA-2016:0506
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.009 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
epss 0.01262 https://api.first.org/data/v1/epss?cve=CVE-2016-2512
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1311431
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2512
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2513
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-pw27-w7w4-9qc7
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 7.4 https://github.com/django/django/commit/382ab137312961ad62feb8109d70a5a581fe8350
generic_textual MODERATE https://github.com/django/django/commit/382ab137312961ad62feb8109d70a5a581fe8350
cvssv3.1 7.4 https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0
generic_textual MODERATE https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0
cvssv3.1 7.4 https://github.com/django/django/commit/fc6d147a63f89795dbcdecb0559256470fff4380
generic_textual MODERATE https://github.com/django/django/commit/fc6d147a63f89795dbcdecb0559256470fff4380
cvssv3.1 7.4 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-15.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-15.yaml
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2016-2512
cvssv3 7.4 https://nvd.nist.gov/vuln/detail/CVE-2016-2512
generic_textual Medium https://ubuntu.com/security/notices/USN-2915-1
cvssv3.1 7.4 https://web.archive.org/web/20210123090815/http://www.securityfocus.com/bid/83879
generic_textual MODERATE https://web.archive.org/web/20210123090815/http://www.securityfocus.com/bid/83879
cvssv3.1 7.4 https://web.archive.org/web/20210413200202/http://www.securitytracker.com/id/1035152
generic_textual MODERATE https://web.archive.org/web/20210413200202/http://www.securitytracker.com/id/1035152
cvssv3.1 3.1 https://www.djangoproject.com/weblog/2016/mar/01/security-releases
generic_textual LOW https://www.djangoproject.com/weblog/2016/mar/01/security-releases
generic_textual Medium https://www.djangoproject.com/weblog/2016/mar/01/security-releases/
cvssv3.1 3.1 http://www.debian.org/security/2016/dsa-3544
generic_textual LOW http://www.debian.org/security/2016/dsa-3544
cvssv3.1 8.8 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
cvssv3.1 3.1 http://www.ubuntu.com/usn/USN-2915-1
generic_textual LOW http://www.ubuntu.com/usn/USN-2915-1
cvssv3.1 3.1 http://www.ubuntu.com/usn/USN-2915-2
generic_textual LOW http://www.ubuntu.com/usn/USN-2915-2
cvssv3.1 3.1 http://www.ubuntu.com/usn/USN-2915-3
generic_textual LOW http://www.ubuntu.com/usn/USN-2915-3
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2512.html
http://rhn.redhat.com/errata/RHSA-2016-0502.html
http://rhn.redhat.com/errata/RHSA-2016-0504.html
http://rhn.redhat.com/errata/RHSA-2016-0505.html
http://rhn.redhat.com/errata/RHSA-2016-0506.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2512.json
https://api.first.org/data/v1/epss?cve=CVE-2016-2512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2513
https://github.com/django/django
https://github.com/django/django/commit/382ab137312961ad62feb8109d70a5a581fe8350
https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0
https://github.com/django/django/commit/fc6d147a63f89795dbcdecb0559256470fff4380
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-15.yaml
https://ubuntu.com/security/notices/USN-2915-1
https://web.archive.org/web/20210123090815/http://www.securityfocus.com/bid/83879
https://web.archive.org/web/20210413200202/http://www.securitytracker.com/id/1035152
https://www.djangoproject.com/weblog/2016/mar/01/security-releases
https://www.djangoproject.com/weblog/2016/mar/01/security-releases/
http://www.debian.org/security/2016/dsa-3544
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/83879
http://www.securitytracker.com/id/1035152
http://www.ubuntu.com/usn/USN-2915-1
http://www.ubuntu.com/usn/USN-2915-2
http://www.ubuntu.com/usn/USN-2915-3
1311431 https://bugzilla.redhat.com/show_bug.cgi?id=1311431
816434 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816434
cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*
CVE-2016-2512 https://nvd.nist.gov/vuln/detail/CVE-2016-2512
GHSA-pw27-w7w4-9qc7 https://github.com/advisories/GHSA-pw27-w7w4-9qc7
RHSA-2016:0502 https://access.redhat.com/errata/RHSA-2016:0502
RHSA-2016:0503 https://access.redhat.com/errata/RHSA-2016:0503
RHSA-2016:0504 https://access.redhat.com/errata/RHSA-2016:0504
RHSA-2016:0505 https://access.redhat.com/errata/RHSA-2016:0505
RHSA-2016:0506 https://access.redhat.com/errata/RHSA-2016:0506
USN-2915-1 https://usn.ubuntu.com/2915-1/
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at http://rhn.redhat.com/errata/RHSA-2016-0502.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at http://rhn.redhat.com/errata/RHSA-2016-0504.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at http://rhn.redhat.com/errata/RHSA-2016-0505.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at http://rhn.redhat.com/errata/RHSA-2016-0506.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N Found at https://github.com/django/django/commit/382ab137312961ad62feb8109d70a5a581fe8350
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N Found at https://github.com/django/django/commit/c5544d289233f501917e25970c03ed444abbd4f0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N Found at https://github.com/django/django/commit/fc6d147a63f89795dbcdecb0559256470fff4380
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-15.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-2512
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-2512
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N Found at https://web.archive.org/web/20210123090815/http://www.securityfocus.com/bid/83879
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N Found at https://web.archive.org/web/20210413200202/http://www.securitytracker.com/id/1035152
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at https://www.djangoproject.com/weblog/2016/mar/01/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at http://www.debian.org/security/2016/dsa-3544
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at http://www.ubuntu.com/usn/USN-2915-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at http://www.ubuntu.com/usn/USN-2915-2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at http://www.ubuntu.com/usn/USN-2915-3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.71077
EPSS Score 0.00320
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.