U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-0742

Change History

Modified Analysis by NIST 11/16/2020 3:13:14 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:nginx:nginx:*:*:*:*:*:*:*:* versions up to (including) 1.8.0
     *cpe:2.3:a:nginx:nginx:1.9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:nginx:nginx:1.9.1:*:*:*:*:*:*:*
     *cpe:2.3:a:nginx:nginx:1.9.2:*:*:*:*:*:*:*
     *cpe:2.3:a:nginx:nginx:1.9.3:*:*:*:*:*:*:*
     *cpe:2.3:a:nginx:nginx:1.9.4:*:*:*:*:*:*:*
     *cpe:2.3:a:nginx:nginx:1.9.5:*:*:*:*:*:*:*
     *cpe:2.3:a:nginx:nginx:1.9.6:*:*:*:*:*:*:*
     *cpe:2.3:a:nginx:nginx:1.9.7:*:*:*:*:*:*:*
     *cpe:2.3:a:nginx:nginx:1.9.8:*:*:*:*:*:*:*
     *cpe:2.3:a:nginx:nginx:1.9.9:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:1.2:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:nginx:nginx:*:*:*:*:*:*:*:* versions from (including) 0.6.18 up to (excluding) 1.8.1
     *cpe:2.3:a:nginx:nginx:*:*:*:*:*:*:*:* versions from (including) 1.9.0 up to (excluding) 1.9.10
Changed CPE Configuration
OR
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
Removed CVSS V3
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-476
Removed CWE
NIST NVD-CWE-Other

								
						
Removed Evaluator Description
<a href="https://cwe.mitre.org/data/definitions/476.html">CWE-476: NULL Pointer Dereference</a>

								
						
Changed Reference Type
http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html No Types Assigned
http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html Mailing List, Third Party Advisory
Changed Reference Type
http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html No Types Assigned
http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html Vendor Advisory
Changed Reference Type
http://www.debian.org/security/2016/dsa-3473 No Types Assigned
http://www.debian.org/security/2016/dsa-3473 Third Party Advisory
Changed Reference Type
http://www.securitytracker.com/id/1034869 No Types Assigned
http://www.securitytracker.com/id/1034869 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.ubuntu.com/usn/USN-2892-1 No Types Assigned
http://www.ubuntu.com/usn/USN-2892-1 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2016:1425 No Types Assigned
https://access.redhat.com/errata/RHSA-2016:1425 Third Party Advisory
Changed Reference Type
https://bto.bluecoat.com/security-advisory/sa115 No Types Assigned
https://bto.bluecoat.com/security-advisory/sa115 Third Party Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1302587 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=1302587 Issue Tracking, Patch, Third Party Advisory
Changed Reference Type
https://security.gentoo.org/glsa/201606-06 No Types Assigned
https://security.gentoo.org/glsa/201606-06 Third Party Advisory