Search for vulnerabilities
Vulnerability details: VCID-7n7r-jf45-aaac
Vulnerability ID VCID-7n7r-jf45-aaac
Aliases CVE-2007-0454
Summary Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.01910 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.03039 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.03039 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.03039 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.03039 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04641 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.04939 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
epss 0.06159 https://api.first.org/data/v1/epss?cve=CVE-2007-0454
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2007-0454
Reference id Reference type URL
http://osvdb.org/33101
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0454.json
https://api.first.org/data/v1/epss?cve=CVE-2007-0454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454
http://secunia.com/advisories/24021
http://secunia.com/advisories/24046
http://secunia.com/advisories/24060
http://secunia.com/advisories/24067
http://secunia.com/advisories/24101
http://secunia.com/advisories/24145
http://secunia.com/advisories/24151
http://securitytracker.com/id?1017588
https://exchange.xforce.ibmcloud.com/vulnerabilities/32304
https://issues.rpath.com/browse/RPL-1005
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
http://us1.samba.org/samba/security/CVE-2007-0454.html
http://www.debian.org/security/2007/dsa-1257
http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
http://www.kb.cert.org/vuls/id/649732
http://www.mandriva.com/security/advisories?name=MDKSA-2007:034
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
http://www.securityfocus.com/archive/1/459179/100/0/threaded
http://www.securityfocus.com/archive/1/459365/100/0/threaded
http://www.securityfocus.com/bid/22403
http://www.trustix.org/errata/2007/0007
http://www.ubuntu.com/usn/usn-419-1
http://www.vupen.com/english/advisories/2007/0483
cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86_64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:x86_64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:x86_64:*:*:*:*:*
CVE-2007-0454 https://nvd.nist.gov/vuln/detail/CVE-2007-0454
GLSA-200702-01 https://security.gentoo.org/glsa/200702-01
USN-419-1 https://usn.ubuntu.com/419-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2007-0454
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.88922
EPSS Score 0.01910
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.