U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-10165

Change History

Modified Analysis by NIST 12/20/2023 11:43:35 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:* versions from (including) 7.3
     *cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* versions from (including) 9.5
     *cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vmware_sra:*:*
     *cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vmware_vasa:*:*
     *cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vmware_vcenter:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
     *cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
     *cpe:2.3:a:netapp:oncommand_unified_manager:7.1:*:*:*:*:vmware_vsphere:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:littlecms:little_cms_color_engine:*:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:littlecms:little_cms_color_engine:*:*:*:*:*:*:*:* versions up to (including) 2.8
Changed CPE Configuration
OR
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Removed CVSS V3
NIST AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2016-2079.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2016-2079.html Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2016-2658.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2016-2658.html Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Patch
Changed Reference Type
http://www.securitytracker.com/id/1039596 No Types Assigned
http://www.securitytracker.com/id/1039596 Third Party Advisory, VDB Entry
Changed Reference Type
https://access.redhat.com/errata/RHSA-2017:2999 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:2999 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2017:3046 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3046 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2017:3264 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3264 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2017:3267 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3267 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2017:3268 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3268 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2017:3453 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3453 Third Party Advisory
Changed Reference Type
https://security.netapp.com/advisory/ntap-20171019-0001/ No Types Assigned
https://security.netapp.com/advisory/ntap-20171019-0001/ Third Party Advisory
Changed Reference Type
https://usn.ubuntu.com/3770-1/ No Types Assigned
https://usn.ubuntu.com/3770-1/ Third Party Advisory
Changed Reference Type
https://usn.ubuntu.com/3770-2/ No Types Assigned
https://usn.ubuntu.com/3770-2/ Third Party Advisory