ID CVE-2016-8616
Summary A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
References
Vulnerable Configurations
  • cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.7-53:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.7-53:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 09-10-2019 - 23:20)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
redhat via4
advisories
  • rhsa
    id RHSA-2018:2486
  • rhsa
    id RHSA-2018:3558
refmap via4
bid 94094
confirm
gentoo GLSA-201701-47
sectrack 1037192
Last major update 09-10-2019 - 23:20
Published 01-08-2018 - 06:29
Back to Top