U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-6793

Change History

Initial Analysis 8/04/2017 9:25:31 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:apache:wicket:1.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:1.5.1:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:1.5.2:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:1.5.3:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:1.5.4:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:1.5.5:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:1.5.6:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.10.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.11.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.12.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.13.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.14.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.15.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.16.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.17.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.18.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.19.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.20.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.21.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.22.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.23.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:wicket:6.24.0:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:L/Au:N/C:N/I:P/A:P)
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Added CWE

								
							
							
						
CWE-502
Changed Reference Type
http://www.openwall.com/lists/oss-security/2016/12/31/1 No Types Assigned
http://www.openwall.com/lists/oss-security/2016/12/31/1 Mailing List
Changed Reference Type
http://www.securityfocus.com/archive/1/archive/1/539975/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/archive/1/539975/100/0/threaded Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/95168 No Types Assigned
http://www.securityfocus.com/bid/95168 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1037541 No Types Assigned
http://www.securitytracker.com/id/1037541 Third Party Advisory, VDB Entry
Changed Reference Type
https://wicket.apache.org/news/2016/12/31/cve-2016-6793.html No Types Assigned
https://wicket.apache.org/news/2016/12/31/cve-2016-6793.html Vendor Advisory
Changed Reference Type
https://www.tenable.com/security/research/tra-2016-23 No Types Assigned
https://www.tenable.com/security/research/tra-2016-23 Third Party Advisory