CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
97.8%
mysql-community-server was updated to 5.6.34 to fix the following issues :
Changes http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6- 34.html http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6- 33.html http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6- 32.html http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6- 31.html
fixed CVEs: CVE-2016-6304, CVE-2016-6662, CVE-2016-7440, CVE-2016-5584, CVE-2016-5617, CVE-2016-5616, CVE-2016-5626, CVE-2016-3492, CVE-2016-5629, CVE-2016-5507, CVE-2016-8283, CVE-2016-5609, CVE-2016-5612, CVE-2016-5627, CVE-2016-5630, CVE-2016-8284, CVE-2016-8288, CVE-2016-3477, CVE-2016-2105, CVE-2016-3486, CVE-2016-3501, CVE-2016-3521, CVE-2016-3615, CVE-2016-3614, CVE-2016-3459, CVE-2016-5439, CVE-2016-5440
fixes SUSE Bugs: [boo#999666], [boo#998309], [boo#1005581], [boo#1005558], [boo#1005563], [boo#1005562], [boo#1005566], [boo#1005555], [boo#1005569], [boo#1005557], [boo#1005582], [boo#1005560], [boo#1005561], [boo#1005567], [boo#1005570], [boo#1005583], [boo#1005586], [boo#989913], [boo#977614], [boo#989914], [boo#989915], [boo#989919], [boo#989922], [boo#989921], [boo#989911], [boo#989925], [boo#989926]
append ‘–ignore-db-dir=lost+found’ to the mysqld options in ‘mysql-systemd-helper’ script if ‘lost+found’ directory is found in $datadir [boo#986251]
remove syslog.target from *.service files [boo#983938]
add systemd to deps to build on leap and friends
replace ‘%(_libexecdir)/systemd/system’ with %(_unitdir) macro
remove useless [email protected] [boo#971456]
replace all occurrences of the string ‘@sysconfdir@’ with ‘/etc’ in mysql-community-server-5.6.3-logrotate.patch as it wasn’t expanded properly [boo#990890]
remove ‘%define _rundir’ as 13.1 is out of support scope
run ‘usermod -g mysql mysql’ only if mysql user is not in mysql group. Run ‘usermod -s /bin/false/ mysql’ only if mysql user doesn’t have ‘/bin/false’ shell set.
re-enable mysql profiling
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2016-1289.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(94756);
script_version("2.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2016-2105", "CVE-2016-3459", "CVE-2016-3477", "CVE-2016-3486", "CVE-2016-3492", "CVE-2016-3501", "CVE-2016-3521", "CVE-2016-3614", "CVE-2016-3615", "CVE-2016-5439", "CVE-2016-5440", "CVE-2016-5507", "CVE-2016-5584", "CVE-2016-5609", "CVE-2016-5612", "CVE-2016-5616", "CVE-2016-5617", "CVE-2016-5626", "CVE-2016-5627", "CVE-2016-5629", "CVE-2016-5630", "CVE-2016-6304", "CVE-2016-6662", "CVE-2016-7440", "CVE-2016-8283", "CVE-2016-8284", "CVE-2016-8288");
script_name(english:"openSUSE Security Update : mysql-community-server (openSUSE-2016-1289)");
script_summary(english:"Check for the openSUSE-2016-1289 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"mysql-community-server was updated to 5.6.34 to fix the following
issues :
- Changes
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-
34.html
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-
33.html
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-
32.html
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-
31.html
- fixed CVEs: CVE-2016-6304, CVE-2016-6662, CVE-2016-7440,
CVE-2016-5584, CVE-2016-5617, CVE-2016-5616,
CVE-2016-5626, CVE-2016-3492, CVE-2016-5629,
CVE-2016-5507, CVE-2016-8283, CVE-2016-5609,
CVE-2016-5612, CVE-2016-5627, CVE-2016-5630,
CVE-2016-8284, CVE-2016-8288, CVE-2016-3477,
CVE-2016-2105, CVE-2016-3486, CVE-2016-3501,
CVE-2016-3521, CVE-2016-3615, CVE-2016-3614,
CVE-2016-3459, CVE-2016-5439, CVE-2016-5440
- fixes SUSE Bugs: [boo#999666], [boo#998309],
[boo#1005581], [boo#1005558], [boo#1005563],
[boo#1005562], [boo#1005566], [boo#1005555],
[boo#1005569], [boo#1005557], [boo#1005582],
[boo#1005560], [boo#1005561], [boo#1005567],
[boo#1005570], [boo#1005583], [boo#1005586],
[boo#989913], [boo#977614], [boo#989914], [boo#989915],
[boo#989919], [boo#989922], [boo#989921], [boo#989911],
[boo#989925], [boo#989926]
- append '--ignore-db-dir=lost+found' to the mysqld
options in 'mysql-systemd-helper' script if 'lost+found'
directory is found in $datadir [boo#986251]
- remove syslog.target from *.service files [boo#983938]
- add systemd to deps to build on leap and friends
- replace '%(_libexecdir)/systemd/system' with %(_unitdir)
macro
- remove useless [email protected] [boo#971456]
- replace all occurrences of the string '@sysconfdir@'
with '/etc' in
mysql-community-server-5.6.3-logrotate.patch as it
wasn't expanded properly [boo#990890]
- remove '%define _rundir' as 13.1 is out of support scope
- run 'usermod -g mysql mysql' only if mysql user is not
in mysql group. Run 'usermod -s /bin/false/ mysql' only
if mysql user doesn't have '/bin/false' shell set.
- re-enable mysql profiling"
);
# http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-31.html
script_set_attribute(
attribute:"see_also",
value:"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-31.html"
);
# http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-32.html
script_set_attribute(
attribute:"see_also",
value:"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-32.html"
);
# http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
script_set_attribute(
attribute:"see_also",
value:"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html"
);
# http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-34.html
script_set_attribute(
attribute:"see_also",
value:"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-34.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005555"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005557"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005558"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005560"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005561"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005562"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005563"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005566"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005567"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005569"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005570"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005581"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005582"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005583"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1005586"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=971456"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=977614"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=983938"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=986251"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=989911"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=989913"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=989914"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=989915"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=989919"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=989921"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=989922"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=989925"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=989926"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=990890"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=998309"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=999666"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected mysql-community-server packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client18");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client18-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client18-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client18-debuginfo-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client_r18");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client_r18-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-bench");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-bench-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-client");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-client-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-errormessages");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-test");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-test-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.2");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/05/05");
script_set_attribute(attribute:"patch_publication_date", value:"2016/11/12");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/11/14");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE42\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.2", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE42.2", reference:"libmysql56client18-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"libmysql56client18-debuginfo-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"libmysql56client_r18-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-bench-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-bench-debuginfo-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-client-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-client-debuginfo-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-debuginfo-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-debugsource-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-errormessages-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-test-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-test-debuginfo-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-tools-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"mysql-community-server-tools-debuginfo-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libmysql56client18-32bit-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libmysql56client18-debuginfo-32bit-5.6.34-19.2") ) flag++;
if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libmysql56client_r18-32bit-5.6.34-19.2") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libmysql56client18-32bit / libmysql56client18 / etc");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3459
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3486
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5439
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5507
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5609
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5617
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5627
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5630
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8284
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8288
bugzilla.opensuse.org/show_bug.cgi?id=1005555
bugzilla.opensuse.org/show_bug.cgi?id=1005557
bugzilla.opensuse.org/show_bug.cgi?id=1005558
bugzilla.opensuse.org/show_bug.cgi?id=1005560
bugzilla.opensuse.org/show_bug.cgi?id=1005561
bugzilla.opensuse.org/show_bug.cgi?id=1005562
bugzilla.opensuse.org/show_bug.cgi?id=1005563
bugzilla.opensuse.org/show_bug.cgi?id=1005566
bugzilla.opensuse.org/show_bug.cgi?id=1005567
bugzilla.opensuse.org/show_bug.cgi?id=1005569
bugzilla.opensuse.org/show_bug.cgi?id=1005570
bugzilla.opensuse.org/show_bug.cgi?id=1005581
bugzilla.opensuse.org/show_bug.cgi?id=1005582
bugzilla.opensuse.org/show_bug.cgi?id=1005583
bugzilla.opensuse.org/show_bug.cgi?id=1005586
bugzilla.opensuse.org/show_bug.cgi?id=971456
bugzilla.opensuse.org/show_bug.cgi?id=977614
bugzilla.opensuse.org/show_bug.cgi?id=983938
bugzilla.opensuse.org/show_bug.cgi?id=986251
bugzilla.opensuse.org/show_bug.cgi?id=989911
bugzilla.opensuse.org/show_bug.cgi?id=989913
bugzilla.opensuse.org/show_bug.cgi?id=989914
bugzilla.opensuse.org/show_bug.cgi?id=989915
bugzilla.opensuse.org/show_bug.cgi?id=989919
bugzilla.opensuse.org/show_bug.cgi?id=989921
bugzilla.opensuse.org/show_bug.cgi?id=989922
bugzilla.opensuse.org/show_bug.cgi?id=989925
bugzilla.opensuse.org/show_bug.cgi?id=989926
bugzilla.opensuse.org/show_bug.cgi?id=990890
bugzilla.opensuse.org/show_bug.cgi?id=998309
bugzilla.opensuse.org/show_bug.cgi?id=999666
dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-31.html
dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-32.html
dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-34.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
97.8%