{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T20:58:20.894","vulnerabilities":[{"cve":{"id":"CVE-2016-0761","sourceIdentifier":"security_alert@emc.com","published":"2017-05-25T17:29:00.490","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cloud Foundry Garden-Linux versions prior to v0.333.0 and Elastic Runtime 1.6.x version prior to 1.6.17 contain a flaw in managing container files during Docker image preparation that could be used to delete, corrupt or overwrite host files and directories, including other container filesystems on the host."},{"lang":"es","value":"Garden-Linux versiones anteriores a v0.333.0 y Elastic Runtime versiones 1.6.x anteriores a 1.6.17 de Cloud Foundry, contienen un fallo en la administración de archivos de contenedor durante la preparación de la imagen Docker que se podría usar para eliminar, corromper o sobrescribir archivos y directorios del host, incluyendo otros sistemas de archivos de contenedor en el host."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-19"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cloudfoundry:garden_linux:*:*:*:*:*:*:*:*","versionEndIncluding":"0.332.0","matchCriteriaId":"4924F19F-491B-4CD8-936F-8E1984899580"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.0:*:*:*:*:*:*:*","matchCriteriaId":"F4CC5918-BC38-46E3-8000-5FE87A65C0E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.1:*:*:*:*:*:*:*","matchCriteriaId":"36926681-35F4-4619-9613-155DEEEA3C8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.2:*:*:*:*:*:*:*","matchCriteriaId":"41FF3C2B-E96F-4DF7-A5C4-703206CB729E"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.3:*:*:*:*:*:*:*","matchCriteriaId":"F9CB3C2D-3080-4A3D-8D8D-1381B5D98920"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.4:*:*:*:*:*:*:*","matchCriteriaId":"782781EB-147C-4B00-84C5-1D8443BFA2D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.5:*:*:*:*:*:*:*","matchCriteriaId":"35A56755-EEB2-4C93-B180-3918A36965AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.6:*:*:*:*:*:*:*","matchCriteriaId":"E4009F10-08AF-470B-B903-38B8A6DBF332"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.7:*:*:*:*:*:*:*","matchCriteriaId":"2B2E8F04-53E6-4A3C-BE4B-8D0DDA22CA8C"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.8:*:*:*:*:*:*:*","matchCriteriaId":"790DAB24-893A-463F-8358-171DACD75074"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.9:*:*:*:*:*:*:*","matchCriteriaId":"3645A1A8-4945-447F-A968-101D5938F9C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.10:*:*:*:*:*:*:*","matchCriteriaId":"0E52C9B9-8F94-48D8-ADA6-96918F6AAD36"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.11:*:*:*:*:*:*:*","matchCriteriaId":"3948FC2F-AF3B-4AF3-968D-F124D03A213A"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.12:*:*:*:*:*:*:*","matchCriteriaId":"4BA44F9B-97D5-48C0-91E9-6D3FEC8B7773"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.13:*:*:*:*:*:*:*","matchCriteriaId":"7B414F88-6541-48C6-B9D6-4DDA035A0037"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.14:*:*:*:*:*:*:*","matchCriteriaId":"66235C7F-D5EE-4989-8D24-6D0781954234"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.15:*:*:*:*:*:*:*","matchCriteriaId":"12E75B49-2419-4313-A648-B5283DA620E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.16:*:*:*:*:*:*:*","matchCriteriaId":"EED70273-3FB2-4652-9AA2-10E2E9D581DE"}]}]}],"references":[{"url":"https://pivotal.io/security/cve-2016-0761","source":"security_alert@emc.com","tags":["Vendor Advisory"]},{"url":"https://pivotal.io/security/cve-2016-0761","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}