Search for vulnerabilities
Vulnerability details: VCID-kr7a-d3jq-aaag
Vulnerability ID VCID-kr7a-d3jq-aaag
Aliases CVE-2004-1051
Summary sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
Status Published
Exploitability 0.5
Weighted Severity 6.5
Risk 3.2
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00060 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.00085 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2004-1051
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=139478
cvssv2 7.2 https://nvd.nist.gov/vuln/detail/CVE-2004-1051
Reference id Reference type URL
http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
http://marc.info/?l=bugtraq&m=110028877431192&w=2
http://marc.info/?l=bugtraq&m=110598298225675&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1051.json
https://api.first.org/data/v1/epss?cve=CVE-2004-1051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051
https://exchange.xforce.ibmcloud.com/vulnerabilities/18055
https://www.ubuntu.com/usn/usn-28-1/
http://www.debian.org/security/2004/dsa-596
http://www.mandriva.com/security/advisories?name=MDKSA-2004:133
http://www.securityfocus.com/bid/11668
http://www.sudo.ws/sudo/alerts/bash_functions.html
http://www.trustix.org/errata/2004/0061/
139478 https://bugzilla.redhat.com/show_bug.cgi?id=139478
cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
CVE-2004-1051 https://nvd.nist.gov/vuln/detail/CVE-2004-1051
No exploits are available.
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2004-1051
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.26754
EPSS Score 0.00060
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.