Search for vulnerabilities
Vulnerability details: VCID-14ux-yqja-aaar
Vulnerability ID VCID-14ux-yqja-aaar
Aliases CVE-2007-5712
GHSA-9v8h-57gv-qch6
PYSEC-2007-1
Summary The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01463 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.01594 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.02701 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.10923 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.10923 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.10923 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.10923 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.10923 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.10923 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.10923 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.10923 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.10923 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.10923 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.25680 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.29920 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
epss 0.29920 https://api.first.org/data/v1/epss?cve=CVE-2007-5712
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=357051
generic_textual MODERATE http://secunia.com/advisories/31961
cvssv3.1 5.9 https://exchange.xforce.ibmcloud.com/vulnerabilities/38143
generic_textual HIGH https://exchange.xforce.ibmcloud.com/vulnerabilities/38143
generic_textual MODERATE https://exchange.xforce.ibmcloud.com/vulnerabilities/38143
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-9v8h-57gv-qch6
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-9v8h-57gv-qch6
cvssv3.1 3.7 https://github.com/django/django
cvssv3.1 5.9 https://github.com/django/django
generic_textual HIGH https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 5.9 https://github.com/django/django/commit/412ed22502e11c50dbfee854627594f0e7e2c234
generic_textual HIGH https://github.com/django/django/commit/412ed22502e11c50dbfee854627594f0e7e2c234
generic_textual MODERATE https://github.com/django/django/commit/412ed22502e11c50dbfee854627594f0e7e2c234
cvssv3.1 5.9 https://github.com/django/django/commit/7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f
generic_textual HIGH https://github.com/django/django/commit/7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f
generic_textual MODERATE https://github.com/django/django/commit/7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f
cvssv3.1 5.9 https://github.com/django/django/commit/8bc36e726c9e8c75c681d3ad232df8e882aaac81
generic_textual HIGH https://github.com/django/django/commit/8bc36e726c9e8c75c681d3ad232df8e882aaac81
generic_textual MODERATE https://github.com/django/django/commit/8bc36e726c9e8c75c681d3ad232df8e882aaac81
cvssv3.1 5.9 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2007-1.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2007-1.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2007-1.yaml
cvssv2 2.6 https://nvd.nist.gov/vuln/detail/CVE-2007-5712
cvssv3.1 5.9 https://nvd.nist.gov/vuln/detail/CVE-2007-5712
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2007-5712
cvssv3.1 5.9 http://sourceforge.net/forum/forum.php?forum_id=749199
generic_textual HIGH http://sourceforge.net/forum/forum.php?forum_id=749199
generic_textual MODERATE http://sourceforge.net/forum/forum.php?forum_id=749199
cvssv3.1 5.9 https://web.archive.org/web/20091201070224/http://secunia.com/advisories/27435
generic_textual HIGH https://web.archive.org/web/20091201070224/http://secunia.com/advisories/27435
generic_textual MODERATE https://web.archive.org/web/20091201070224/http://secunia.com/advisories/27435
cvssv3.1 5.9 https://web.archive.org/web/20111224195100/http://secunia.com/advisories/27597
generic_textual HIGH https://web.archive.org/web/20111224195100/http://secunia.com/advisories/27597
generic_textual MODERATE https://web.archive.org/web/20111224195100/http://secunia.com/advisories/27597
cvssv3.1 5.9 https://web.archive.org/web/20111229085535/http://secunia.com/advisories/31961
generic_textual HIGH https://web.archive.org/web/20111229085535/http://secunia.com/advisories/31961
generic_textual MODERATE https://web.archive.org/web/20111229085535/http://secunia.com/advisories/31961
cvssv3.1 5.9 https://web.archive.org/web/20200228183657/http://www.securityfocus.com/bid/26227
generic_textual HIGH https://web.archive.org/web/20200228183657/http://www.securityfocus.com/bid/26227
generic_textual MODERATE https://web.archive.org/web/20200228183657/http://www.securityfocus.com/bid/26227
cvssv3.1 5.9 https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00243.html
generic_textual HIGH https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00243.html
generic_textual MODERATE https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00243.html
cvssv3.1 5.9 https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00257.html
generic_textual HIGH https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00257.html
generic_textual MODERATE https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00257.html
cvssv3.1 5.9 http://www.debian.org/security/2008/dsa-1640
cvssv3.1 7.5 http://www.debian.org/security/2008/dsa-1640
generic_textual HIGH http://www.debian.org/security/2008/dsa-1640
cvssv3.1 5.9 http://www.djangoproject.com/weblog/2007/oct/26/security-fix
generic_textual HIGH http://www.djangoproject.com/weblog/2007/oct/26/security-fix
generic_textual MODERATE http://www.djangoproject.com/weblog/2007/oct/26/security-fix
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5712.json
https://api.first.org/data/v1/epss?cve=CVE-2007-5712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5712
http://secunia.com/advisories/27435
http://secunia.com/advisories/27597
http://secunia.com/advisories/31961
https://exchange.xforce.ibmcloud.com/vulnerabilities/38143
https://github.com/django/django
https://github.com/django/django/commit/412ed22502e11c50dbfee854627594f0e7e2c234
https://github.com/django/django/commit/7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f
https://github.com/django/django/commit/8bc36e726c9e8c75c681d3ad232df8e882aaac81
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2007-1.yaml
http://sourceforge.net/forum/forum.php?forum_id=749199
https://web.archive.org/web/20091201070224/http://secunia.com/advisories/27435
https://web.archive.org/web/20111224195100/http://secunia.com/advisories/27597
https://web.archive.org/web/20111229085535/http://secunia.com/advisories/31961
https://web.archive.org/web/20200228183657/http://www.securityfocus.com/bid/26227
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00243.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00257.html
http://www.debian.org/security/2008/dsa-1640
http://www.djangoproject.com/weblog/2007/oct/26/security-fix
http://www.securityfocus.com/bid/26227
http://www.vupen.com/english/advisories/2007/3660
http://www.vupen.com/english/advisories/2007/3661
357051 https://bugzilla.redhat.com/show_bug.cgi?id=357051
448838 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448838
cpe:2.3:a:django_project:django:0.91:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:django_project:django:0.91:*:*:*:*:*:*:*
cpe:2.3:a:django_project:django:0.95:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:django_project:django:0.95:*:*:*:*:*:*:*
cpe:2.3:a:django_project:django:0.95.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:django_project:django:0.95.1:*:*:*:*:*:*:*
cpe:2.3:a:django_project:django:0.96:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:django_project:django:0.96:*:*:*:*:*:*:*
CVE-2007-5712 https://nvd.nist.gov/vuln/detail/CVE-2007-5712
GHSA-9v8h-57gv-qch6 https://github.com/advisories/GHSA-9v8h-57gv-qch6
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://exchange.xforce.ibmcloud.com/vulnerabilities/38143
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/412ed22502e11c50dbfee854627594f0e7e2c234
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/7dd2dd08a79e388732ce00e2b5514f15bd6d0f6f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/8bc36e726c9e8c75c681d3ad232df8e882aaac81
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2007-1.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2007-5712
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2007-5712
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://sourceforge.net/forum/forum.php?forum_id=749199
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20091201070224/http://secunia.com/advisories/27435
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20111224195100/http://secunia.com/advisories/27597
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20111229085535/http://secunia.com/advisories/31961
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20200228183657/http://www.securityfocus.com/bid/26227
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00243.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00257.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.debian.org/security/2008/dsa-1640
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.debian.org/security/2008/dsa-1640
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.djangoproject.com/weblog/2007/oct/26/security-fix
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.79081
EPSS Score 0.01463
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.