This is not the latest report. Click
here to view the latest report.
CVSS v2 Statistics for Red Hat, Inc. as of 02/04/2023
0
240
40
165
Reference
0-69.9%
|
Contributor |
68.8
Contributor
70-94.9%
Provider
95-100%
CVE | CNA Value | Alignment | NIST Value | Reason |
---|---|---|---|---|
CVE-2012-2375
(6 of 6)
![]() |
Access Vector (AV) Adjacent Network | Access Vector (AV) Adjacent Network | ||
Access Complexity (AC) High | Access Complexity (AC) High | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-4455
(5 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-4470
(3 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) None | ||
Integrity (I) Complete | ≠ | Integrity (I) None | ||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-4971
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) None | ||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | ≠ | Availability (A) None | ||
CVE-2016-4992
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-4994
(3 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | ||
Integrity (I) None | ≠ | Integrity (I) Partial | ||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-4995
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-4996
(2 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | ||
Integrity (I) Complete | ≠ | Integrity (I) None | ||
Availability (A) Complete | ≠ | Availability (A) None | ||
CVE-2016-4997
(6 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-4998
(6 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-5009
(2 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) None | ||
Integrity (I) Partial | ≠ | Integrity (I) None | ||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-5126
(3 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | ||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-5384
(5 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-5385
(3 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | ≠ | Access Complexity (AC) High | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | ||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | ≠ | Availability (A) Partial | ||
CVE-2016-5388
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | Access Complexity (AC) High | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | ||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | ≠ | Availability (A) Partial | ||
CVE-2016-5392
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-5399
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-5412
(4 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-5416
(6 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-5425
(5 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-5699
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | ≠ | Access Complexity (AC) Medium | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-6319
(4 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) Partial | ≠ | Confidentiality (C) None | ||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-6320
(5 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) None | ||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-6325
(5 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-6828
(4 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | ≠ | Integrity (I) None | ||
Availability (A) Partial | ≠ | Availability (A) Complete | ||
CVE-2016-6835
(2 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | ≠ | Integrity (I) None | ||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-7097
(5 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-7422
(3 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-8576
(3 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-8612
(5 of 6)
![]() |
Access Vector (AV) Adjacent Network | Access Vector (AV) Adjacent Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-8650
(6 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-8657
(5 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-8909
(3 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-8910
(3 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9576
(5 of 6)
![]() |
Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-9907
(2 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | ≠ | Availability (A) Complete | ||
CVE-2017-2596
(3 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2017-12168
(3 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2017-12188
(3 of 6)
![]() |
Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | |
Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2017-15124
(3 of 6)
![]() |
Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | ||
Authentication (Au) Single | ≠ | Authentication (Au) None | ||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | ≠ | Availability (A) Complete |