CVSS v2 Statistics for Red Hat, Inc. as of 02/13/2023
0
240
40
166
Reference
0-69.9%
|
Reference |
69.2
Contributor
70-94.9%
Provider
95-100%
CVE | CNA Value | Alignment | NIST Value | Reason |
---|---|---|---|---|
CVE-2016-8614 (3 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) None | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | ≠ | Availability (A) None | Assessment performed prior to CVMAP efforts | |
CVE-2016-8615 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-8616 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-8617 (3 of 6) | Access Vector (AV) Network | ≠ | Access Vector (AV) Local | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-8618 (3 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-8619 (3 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-8620 (4 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-8621 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-8622 (3 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-8623 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-8624 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-8625 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-8626 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-8627 (6 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-8628 (1 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | ≠ | Authentication (Au) Single | Assessment performed prior to CVMAP efforts | |
Confidentiality (C) Partial | ≠ | Confidentiality (C) Complete | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | ≠ | Integrity (I) Complete | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | ≠ | Availability (A) Complete | Assessment performed prior to CVMAP efforts | |
CVE-2016-8639 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) None | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-8654 (6 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-8656 (2 of 6) | Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) Complete | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Complete | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-9574 (6 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9577 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9578 (6 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9583 (4 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) None | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9586 (3 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Medium | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) None | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9587 (3 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) Complete | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | ≠ | Integrity (I) Complete | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | ≠ | Availability (A) Complete | Assessment performed prior to CVMAP efforts | |
CVE-2016-9592 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2016-9593 (4 of 6) | Access Vector (AV) Local | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) None | Availability (A) None | |||
CVE-2016-9594 (4 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | ≠ | Confidentiality (C) Partial | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-9595 (2 of 6) | Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Complete | ≠ | Confidentiality (C) None | Assessment performed prior to CVMAP efforts | |
Integrity (I) Complete | ≠ | Integrity (I) Partial | Assessment performed prior to CVMAP efforts | |
Availability (A) Complete | ≠ | Availability (A) Partial | Assessment performed prior to CVMAP efforts | |
CVE-2016-9602 (4 of 6) | Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Complete | Confidentiality (C) Complete | |||
Integrity (I) Complete | Integrity (I) Complete | |||
Availability (A) Complete | Availability (A) Complete | |||
CVE-2016-9603 (1 of 6) | Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) Complete | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | ≠ | Integrity (I) Complete | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | ≠ | Availability (A) Complete | Assessment performed prior to CVMAP efforts | |
CVE-2016-9604 (5 of 6) | Access Vector (AV) Local | Access Vector (AV) Local | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2017-2591 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-2620 (1 of 6) | Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | ≠ | Confidentiality (C) Complete | Assessment performed prior to CVMAP efforts | |
Integrity (I) Partial | ≠ | Integrity (I) Complete | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | ≠ | Availability (A) Complete | Assessment performed prior to CVMAP efforts | |
CVE-2017-2630 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) High | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-2633 (3 of 6) | Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Network | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | ≠ | Integrity (I) None | Assessment performed prior to CVMAP efforts | |
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-2653 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) Single | Authentication (Au) Single | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None | |||
CVE-2017-7518 (4 of 6) | Access Vector (AV) Adjacent Network | ≠ | Access Vector (AV) Local | Assessment performed prior to CVMAP efforts |
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-15118 (6 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Low | Access Complexity (AC) Low | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2017-15119 (5 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | ≠ | Access Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Partial | Availability (A) Partial | |||
CVE-2018-1067 (6 of 6) | Access Vector (AV) Network | Access Vector (AV) Network | ||
Access Complexity (AC) Medium | Access Complexity (AC) Medium | |||
Authentication (Au) None | Authentication (Au) None | |||
Confidentiality (C) Partial | Confidentiality (C) Partial | |||
Integrity (I) Partial | Integrity (I) Partial | |||
Availability (A) None | Availability (A) None |