U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-5425

Change History

Modified Analysis by NIST 7/23/2020 2:24:42 PM

Action Type Old Value New Value
Changed CPE Configuration
AND
     OR
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:a:apache:tomcat:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
          cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
          cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
          cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Removed CPE Configuration
OR
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*

								
						
Removed CPE Configuration
OR
     *cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*

								
						
Removed CVSS V3
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-276
Removed CWE
NIST CWE-264

								
						
Changed Reference Type
http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html Vendor Advisory
http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html Exploit, Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/93472 Broken Link
http://www.securityfocus.com/bid/93472 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1036979 No Types Assigned
http://www.securitytracker.com/id/1036979 Third Party Advisory, VDB Entry
Changed Reference Type
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d@%3Cissues.activemq.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d@%3Cissues.activemq.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://www.exploit-db.com/exploits/40488/ No Types Assigned
https://www.exploit-db.com/exploits/40488/ Third Party Advisory, VDB Entry
Changed Reference Type
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html No Types Assigned
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html Third Party Advisory