U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVSS v3.1 Statistics for OpenAnolis as of 09/16/2022

5
40
 
5
27
Reference
0-69.9%
Reference
67.5
Contributor
70-94.9%
 
Provider
95-100%
CVE CNA Value Alignment NIST Value Reason
CVE-2022-1678   (7 of 8) Warning Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) High Attack Complexity (AC) Low No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst
Privileges Required (PR) None Privileges Required (PR) None
User Interaction (UI) None User Interaction (UI) None
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) None Confidentiality (C) None
Integrity (I) None Integrity (I) None
Availability (A) High Availability (A) High
CVE-2022-36280   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Local Applied AV:L due to local vector identified
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) None Confidentiality (C) None
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) High Availability (A) High
CVE-2022-38096   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Local Applied AV:L due to local vector identified
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) None Confidentiality (C) None
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) High Availability (A) High
CVE-2022-38457   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Local Applied AV:L due to local vector identified
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) None Confidentiality (C) None
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) High Availability (A) High
CVE-2022-40133   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Local Applied AV:L due to local vector identified
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) None Confidentiality (C) None
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) High Availability (A) High