7.8
CVE-2016-9795
- EPSS 0.07%
- Veröffentlicht 27.01.2017 22:59:02
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Broadcom ≫ Ca Workload Automation Ae Version11.0
Broadcom ≫ Ca Workload Automation Ae Version11.3
Broadcom ≫ Ca Workload Automation Ae Version11.3.5
Broadcom ≫ Ca Workload Automation Ae Version11.3.6
Broadcom ≫ Client Automation Version12.8
Broadcom ≫ Client Automation Version12.9
Broadcom ≫ Client Automation Version14.0
Broadcom ≫ Systemedge Version5.8.2
Broadcom ≫ Systemedge Version5.9
Broadcom ≫ Systems Performance For Infrastructure Managers Version12.8
Broadcom ≫ Systems Performance For Infrastructure Managers Version12.9
Ca ≫ Universal Job Management Agent Version11.2
Ca ≫ Virtual Assurance For Infrastructure Managers Version12.8
Ca ≫ Virtual Assurance For Infrastructure Managers Version12.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.183 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.