Search for vulnerabilities
Vulnerability details: VCID-c3z8-xyev-aaah
Vulnerability ID VCID-c3z8-xyev-aaah
Aliases CVE-2013-4134
Summary OpenAFS before 1.4.15, 1.6.x before 1.6.5, and 1.7.x before 1.7.26 uses weak encryption (DES) for Kerberos keys, which makes it easier for remote attackers to obtain the service key.
Status Published
Exploitability 0.5
Weighted Severity 3.9
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00241 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00276 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00276 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00276 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
epss 0.00276 https://api.first.org/data/v1/epss?cve=CVE-2013-4134
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2013-4134
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2013-4134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4135
http://www.debian.org/security/2013/dsa-2729
http://www.mandriva.com/security/advisories?name=MDVSA-2014:244
http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt
cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.0:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0.4a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.0.4a:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.1.1a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.1.1a:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.2a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.2a:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.2b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.2b:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.70:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.3.70:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.74:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.3.74:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.77:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.3.77:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.81:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.3.81:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7_pre1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.7_pre1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7_pre2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.7_pre2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7_pre3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.7_pre3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7_pre4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.7_pre4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7_pre5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.7_pre5:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.8_pre1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.8_pre1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.8_pre2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.8_pre2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.8_pre3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.8_pre3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.6.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.10:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.11:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.12:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.13:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.14:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.15:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.16:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.17:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.18:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.19:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.20:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.21:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.22:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.23:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.24:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.24:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.25:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.25:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.8:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
CVE-2013-4134 https://nvd.nist.gov/vuln/detail/CVE-2013-4134
GLSA-201404-05 https://security.gentoo.org/glsa/201404-05
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2013-4134
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.32538
EPSS Score 0.00152
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.