CVE-2016-10659

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-10659
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10659.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-10659
Aliases
Published
2018-05-29T20:29:01Z
Modified
2025-07-29T06:59:50.613193Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

poco - The POCO libraries, downloads source file resources used for compilation over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.

References

Affected packages

Git / github.com/pocoproject/poco

Affected ranges

Type
GIT
Repo
https://github.com/pocoproject/poco
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

poco-1.*

poco-1.5.1-release
poco-1.5.2-rc1
poco-1.5.2-rc2
poco-1.5.2-rc3
poco-1.5.2-release
poco-1.5.3-rc1
poco-1.5.3-release
poco-1.5.4-release
poco-1.6.0-release
poco-1.6.1-release
poco-1.7.0-release
poco-1.7.1-release
poco-1.7.2-release
poco-1.7.3-release
poco-1.7.4-release
poco-1.7.5-release
poco-1.7.6-release
poco-1.7.7-release