Communications Application Session Controller
by Oracle
Standard maintenance is sufficient
Communications Application Session Controller has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
22.2%
Confirmed actively exploited (CISA)
5.6%
Public exploit code available
0.0%
Based on 18 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2016-8735 | 9.8 | 93.8% | Yes |
| CVE-2013-2566 | 5.9 | 90.8% | — |
| CVE-2018-11784 | 4.3 | 82.6% | — |
| CVE-2017-3730 | 7.5 | 52.9% | — |
| CVE-2020-10683 | 9.8 | 7.0% | — |
| CVE-2018-1000613 | 9.8 | 5.0% | — |
| CVE-2020-28052 | 8.1 | 4.1% | — |
| CVE-2021-2351 | 8.3 | 3.1% | — |
| CVE-2020-11022 | 6.9 | 2.1% | — |
| CVE-2019-11358 | 6.1 | 1.9% | — |
| CVE-2019-10219 | 6.1 | 1.7% | — |
| CVE-2020-5258 | 7.7 | 1.5% | — |
| CVE-2020-11987 | 8.2 | 1.4% | — |
| CVE-2019-17566 | 7.5 | 0.8% | — |
| CVE-2021-29425 | 4.8 | 0.5% | — |
| CVE-2018-1000180 | 7.5 | 0.3% | — |
| CVE-2020-27216 | 7.0 | 0.1% | — |
| CVE-2020-9488 | 3.7 | 0.0% | — |
20
/ 100
low-risk
Active Threat
18/50 · Low
Exploit Availability
2/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.