Search for vulnerabilities
Vulnerability details: VCID-7vqc-rq31-aaaq
Vulnerability ID VCID-7vqc-rq31-aaaq
Aliases CVE-2017-1000487
GHSA-8vhq-qq4p-grq3
Summary OS Command Injection Plexus-utils is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2018:1322
cvssv3 7.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000487.json
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.00395 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07523 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.07628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.17611 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.17611 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.17611 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.22172 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.24804 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.24804 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.24804 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.24804 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.24804 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.24804 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.24804 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.24804 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.24804 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.25059 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.25059 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
epss 0.47666 https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1532497
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-8vhq-qq4p-grq3
cvssv3.1 4.3 https://github.com/codehaus-plexus/plexus-utils
generic_textual MODERATE https://github.com/codehaus-plexus/plexus-utils
cvssv3.1 9.8 https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
generic_textual CRITICAL https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
cvssv3.1 7.5 https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
cvssv3.1 9.8 https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
generic_textual CRITICAL https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
cvssv3.1 9.8 https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62@%3Cdev.avro.apache.org%3E
generic_textual CRITICAL https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62@%3Cdev.avro.apache.org%3E
cvssv3.1 9.8 https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62%40%3Cdev.avro.apache.org%3E
generic_textual CRITICAL https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62%40%3Cdev.avro.apache.org%3E
cvssv3.1 9.4 https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E
generic_textual CRITICAL https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E
cvssv3.1 9.8 https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf%40%3Ccommits.pulsar.apache.org%3E
generic_textual CRITICAL https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf%40%3Ccommits.pulsar.apache.org%3E
cvssv3.1 3.7 https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
cvssv3.1 4.8 https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E
cvssv3.1 9.8 https://lists.debian.org/debian-lts-announce/2018/01/msg00010.html
generic_textual CRITICAL https://lists.debian.org/debian-lts-announce/2018/01/msg00010.html
cvssv3.1 9.8 https://lists.debian.org/debian-lts-announce/2018/01/msg00011.html
generic_textual CRITICAL https://lists.debian.org/debian-lts-announce/2018/01/msg00011.html
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2017-1000487
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2017-1000487
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2017-1000487
cvssv3.1 9.8 https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31522
generic_textual CRITICAL https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31522
cvssv3.1 9.8 https://www.debian.org/security/2018/dsa-4146
generic_textual CRITICAL https://www.debian.org/security/2018/dsa-4146
cvssv3.1 9.8 https://www.debian.org/security/2018/dsa-4149
generic_textual CRITICAL https://www.debian.org/security/2018/dsa-4149
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000487.json
https://api.first.org/data/v1/epss?cve=CVE-2017-1000487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000487
https://github.com/codehaus-plexus/plexus-utils
https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62@%3Cdev.avro.apache.org%3E
https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62%40%3Cdev.avro.apache.org%3E
https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf%40%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/01/msg00010.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00011.html
https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31522
https://www.debian.org/security/2018/dsa-4146
https://www.debian.org/security/2018/dsa-4149
1532497 https://bugzilla.redhat.com/show_bug.cgi?id=1532497
cpe:2.3:a:codehaus-plexus:plexus-utils:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:codehaus-plexus:plexus-utils:*:*:*:*:*:*:*:*
cpe:2.3:a:plexus-utils_project:plexus-utils:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:plexus-utils_project:plexus-utils:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2017-1000487 https://nvd.nist.gov/vuln/detail/CVE-2017-1000487
GHSA-8vhq-qq4p-grq3 https://github.com/advisories/GHSA-8vhq-qq4p-grq3
RHSA-2018:1322 https://access.redhat.com/errata/RHSA-2018:1322
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000487.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/codehaus-plexus/plexus-utils
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62@%3Cdev.avro.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62%40%3Cdev.avro.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L Found at https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf%40%3Ccommits.pulsar.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2018/01/msg00010.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2018/01/msg00011.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2017-1000487
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2017-1000487
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2017-1000487
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31522
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2018/dsa-4146
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2018/dsa-4149
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.73948
EPSS Score 0.00395
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.