Versio.io

CVE-2016-3725

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 11-05-2016 02:00
Last modified: - 11-05-2016 02:00
Total changes: - 14

Description

CVE-2016-3725 jenkins: Regular users can trigger download of update site metadata (SECURITY-273)

Common Vulnerability Scoring System (CVSS)

AV:N/AC:M/Au:S/C:N/I:N/A:P
Low
Attack complexity
Network
Attack vector
Low
Availability
None
Confidentiality
None
Integrity
-
Privileges required
-
Scope
-
User interaction
3.5
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=jenkins-0 AND versionEndExcluding=1.651.2-1.el7
vendor=Red Hat Enterprise Linux AND product=openshift AND version=3.2
AND
product=jenkins-plugin-openshift-pipeline-0 AND versionEndExcluding=1.0.12-1.el7
vendor=Red Hat Enterprise Linux AND product=openshift AND version=3.2
AND
product=activemq-0 AND versionEndExcluding=5.9.0-6.redhat.611463.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=ImageMagick-0 AND versionEndExcluding=6.7.2.7-5.el6_8
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=jenkins-0 AND versionEndExcluding=1.651.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=libcgroup-0 AND versionEndExcluding=0.40.rc1-18.el6_8
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-broker-0 AND versionEndExcluding=1.16.3.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-broker-util-0 AND versionEndExcluding=1.37.6.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-cron-0 AND versionEndExcluding=1.25.4.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-diy-0 AND versionEndExcluding=1.26.2.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-haproxy-0 AND versionEndExcluding=1.31.6.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-jbosseap-0 AND versionEndExcluding=2.27.4.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-jbossews-0 AND versionEndExcluding=1.35.5.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-jenkins-0 AND versionEndExcluding=1.29.2.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-jenkins-client-0 AND versionEndExcluding=1.26.1.1-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-mongodb-0 AND versionEndExcluding=1.26.2.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-mysql-0 AND versionEndExcluding=1.31.3.3-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-nodejs-0 AND versionEndExcluding=1.33.1.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-perl-0 AND versionEndExcluding=1.30.2.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-php-0 AND versionEndExcluding=1.35.4.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-python-0 AND versionEndExcluding=1.34.3.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-cartridge-ruby-0 AND versionEndExcluding=1.32.2.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-msg-node-mcollective-0 AND versionEndExcluding=1.30.2.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-node-proxy-0 AND versionEndExcluding=1.26.3.1-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-node-util-0 AND versionEndExcluding=1.38.7.1-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=rhc-0 AND versionEndExcluding=1.38.7.1-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=rubygem-openshift-origin-admin-console-0 AND versionEndExcluding=1.28.2.1-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=rubygem-openshift-origin-controller-0 AND versionEndExcluding=1.38.6.4-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=rubygem-openshift-origin-frontend-haproxy-sni-proxy-0 AND versionEndExcluding=0.5.2.1-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=rubygem-openshift-origin-msg-broker-mcollective-0 AND versionEndExcluding=1.36.2.4-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=rubygem-openshift-origin-node-0 AND versionEndExcluding=1.38.6.4-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=rubygem-openshift-origin-routing-daemon-0 AND versionEndExcluding=0.26.6.1-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=jenkins-0 AND versionEndExcluding=1.651.2-1.el7
vendor=Red Hat Enterprise Linux AND product=openshift AND version=3.1
AND
product=jenkins-plugin-openshift-pipeline-0 AND versionEndExcluding=1.0.12-1.el7
vendor=Red Hat Enterprise Linux AND product=openshift AND version=3.1
 

Reference

 


Keywords

REDHAT

 

CVE-2016-3725

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.