Vulnerability Database

328,781

Total vulnerabilities in the database

CVE-2016-0713

Gorouter in Cloud Foundry cf-release v141 through v228 allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks via vectors related to modified requests.

  • Published: Aug 31, 2017
  • Updated: Nov 9, 2025
  • CVE: CVE-2016-0713
  • Severity: Low
  • Exploit:

CVSS v2:

  • Severity: Low
  • Score: 2.6
  • AV:N/AC:H/Au:N/C:N/I:P/A:N
Software From Fixed in
cloudfoundry / cf-release 196 196.x
cloudfoundry / cf-release 221 221.x
cloudfoundry / cf-release 159 159.x
cloudfoundry / cf-release 162 162.x
cloudfoundry / cf-release 174 174.x
cloudfoundry / cf-release 141 141.x
cloudfoundry / cf-release 152 152.x
cloudfoundry / cf-release 200 200.x
cloudfoundry / cf-release 184 184.x
cloudfoundry / cf-release 222 222.x
cloudfoundry / cf-release 215 215.x
cloudfoundry / cf-release 185 185.x
cloudfoundry / cf-release 218 218.x
cloudfoundry / cf-release 217 217.x
cloudfoundry / cf-release 165 165.x
cloudfoundry / cf-release 173 173.x
cloudfoundry / cf-release 195 195.x
cloudfoundry / cf-release 158 158.x
cloudfoundry / cf-release 212 212.x
cloudfoundry / cf-release 205 205.x
cloudfoundry / cf-release 190 190.x
cloudfoundry / cf-release 148 148.x
cloudfoundry / cf-release 142 142.x
cloudfoundry / cf-release 179 179.x
cloudfoundry / cf-release 182 182.x
cloudfoundry / cf-release 147 147.x
cloudfoundry / cf-release 161 161.x
cloudfoundry / cf-release 224 224.x
cloudfoundry / cf-release 150 150.x
cloudfoundry / cf-release 228 228.x
cloudfoundry / cf-release 175 175.x
cloudfoundry / cf-release 214 214.x
cloudfoundry / cf-release 146 146.x
cloudfoundry / cf-release 145 145.x
cloudfoundry / cf-release 192 192.x
cloudfoundry / cf-release 166 166.x
cloudfoundry / cf-release 181 181.x
cloudfoundry / cf-release 219 219.x
cloudfoundry / cf-release 155 155.x
cloudfoundry / cf-release 187 187.x
cloudfoundry / cf-release 227 227.x
cloudfoundry / cf-release 169 169.x
cloudfoundry / cf-release 164 164.x
cloudfoundry / cf-release 153 153.x
cloudfoundry / cf-release 202 202.x
cloudfoundry / cf-release 198 198.x
cloudfoundry / cf-release 204 204.x
cloudfoundry / cf-release 188 188.x
cloudfoundry / cf-release 191 191.x
cloudfoundry / cf-release 168 168.x
cloudfoundry / cf-release 163 163.x
cloudfoundry / cf-release 194 194.x
cloudfoundry / cf-release 209 209.x
cloudfoundry / cf-release 225 225.x
cloudfoundry / cf-release 156 156.x
cloudfoundry / cf-release 216 216.x
cloudfoundry / cf-release 178 178.x
cloudfoundry / cf-release 208 208.x
cloudfoundry / cf-release 172 172.x
cloudfoundry / cf-release 223 223.x
cloudfoundry / cf-release 176 176.x
cloudfoundry / cf-release 177 177.x
cloudfoundry / cf-release 180 180.x
cloudfoundry / cf-release 160 160.x
cloudfoundry / cf-release 183 183.x
cloudfoundry / cf-release 213 213.x
cloudfoundry / cf-release 211 211.x
cloudfoundry / cf-release 149 149.x
cloudfoundry / cf-release 154 154.x
cloudfoundry / cf-release 186 186.x
cloudfoundry / cf-release 151 151.x
cloudfoundry / cf-release 144 144.x
cloudfoundry / cf-release 143 143.x
cloudfoundry / cf-release 210 210.x
cloudfoundry / cf-release 199 199.x
cloudfoundry / cf-release 197 197.x
cloudfoundry / cf-release 170 170.x
cloudfoundry / cf-release 203 203.x
cloudfoundry / cf-release 201 201.x
cloudfoundry / cf-release 206 206.x
cloudfoundry / cf-release 157 157.x
cloudfoundry / cf-release 167 167.x
cloudfoundry / cf-release 207 207.x
cloudfoundry / cf-release 171 171.x
cloudfoundry / cf-release 226 226.x
cloudfoundry / cf-release 220 220.x
cloudfoundry / cf-release 193 193.x
cloudfoundry / cf-release 189 189.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.