This is not the latest report. Click
here to view the latest report.
CVSS v2 Statistics for Red Hat, Inc. as of 05/14/2020
0
240
40
177
Reference
0-69.9%
|
Contributor |
73.8
Contributor
70-94.9%
Provider
95-100%
CVE | CNA Value | Alignment | NIST Value | Reason |
---|---|---|---|---|
CVE-2016-8647
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-8648
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-8651
(5 of 6)
![]() |
Access Vector (AV) Adjacent Network | Access Vector (AV) Adjacent Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-8653
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-8654
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-8656
(2 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) Complete | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Complete | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-9572
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9573
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9574
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9577
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9578
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9579
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9580
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) None | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9581
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) None | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9583
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) None | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9586
(3 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) None | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9587
(3 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) Complete | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | ≠ | Integrity (I) Complete | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | ≠ | Availability (A) Complete | Assessment performed prior to CVMAP efforts | |
CVE-2016-9592
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9593
(4 of 6)
![]() |
Access Vector (AV) Local | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-9594
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-9595
(2 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) None | Assessment performed prior to CVMAP efforts | |
Integrity (I) Complete | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Complete | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-9597
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9602
(4 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-9603
(1 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) Complete | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | ≠ | Integrity (I) Complete | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | ≠ | Availability (A) Complete | Assessment performed prior to CVMAP efforts | |
CVE-2016-9604
(5 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2017-2591
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-2615
(1 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) Complete | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | ≠ | Integrity (I) Complete | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | ≠ | Availability (A) Complete | Assessment performed prior to CVMAP efforts | |
CVE-2017-2620
(1 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) Complete | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | ≠ | Integrity (I) Complete | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | ≠ | Availability (A) Complete | Assessment performed prior to CVMAP efforts | |
CVE-2017-2630
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-2633
(3 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | ≠ | Integrity (I) None | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-2639
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2017-2653
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2017-2658
(5 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2017-7464
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-7465
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-7518
(4 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-7539
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-15118
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-15119
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2018-1067
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None |