Search for vulnerabilities
Vulnerability details: VCID-nm2g-nz56-aaas
Vulnerability ID VCID-nm2g-nz56-aaas
Aliases CVE-2006-5752
Summary Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual LOW http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
rhas Moderate https://access.redhat.com/errata/RHSA-2007:0532
rhas Moderate https://access.redhat.com/errata/RHSA-2007:0533
rhas Moderate https://access.redhat.com/errata/RHSA-2007:0534
rhas Moderate https://access.redhat.com/errata/RHSA-2007:0556
rhas Moderate https://access.redhat.com/errata/RHSA-2007:0557
rhas Moderate https://access.redhat.com/errata/RHSA-2008:0261
rhas Low https://access.redhat.com/errata/RHSA-2008:0263
rhas Low https://access.redhat.com/errata/RHSA-2008:0523
rhas Low https://access.redhat.com/errata/RHSA-2008:0524
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0602
epss 0.12952 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.12952 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.12952 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.12952 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.12952 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.12952 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.14782 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15794 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.15851 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.28598 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.32127 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.32127 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
epss 0.32127 https://api.first.org/data/v1/epss?cve=CVE-2006-5752
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=245112
apache_httpd moderate https://httpd.apache.org/security/json/CVE-2006-5752.json
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2006-5752
generic_textual LOW http://www.redhat.com/support/errata/RHSA-2008-0261.html
Reference id Reference type URL
http://bugs.gentoo.org/show_bug.cgi?id=186219
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
http://httpd.apache.org/security/vulnerabilities_13.html
http://httpd.apache.org/security/vulnerabilities_20.html
http://httpd.apache.org/security/vulnerabilities_22.html
http://lists.vmware.com/pipermail/security-announce/2009/000062.html
http://osvdb.org/37052
http://rhn.redhat.com/errata/RHSA-2007-0534.html
http://rhn.redhat.com/errata/RHSA-2007-0556.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5752.json
https://api.first.org/data/v1/epss?cve=CVE-2006-5752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752
http://secunia.com/advisories/25827
http://secunia.com/advisories/25830
http://secunia.com/advisories/25873
http://secunia.com/advisories/25920
http://secunia.com/advisories/26273
http://secunia.com/advisories/26443
http://secunia.com/advisories/26458
http://secunia.com/advisories/26508
http://secunia.com/advisories/26822
http://secunia.com/advisories/26842
http://secunia.com/advisories/26993
http://secunia.com/advisories/27037
http://secunia.com/advisories/27563
http://secunia.com/advisories/27732
http://secunia.com/advisories/28212
http://secunia.com/advisories/28224
http://secunia.com/advisories/28606
http://security.gentoo.org/glsa/glsa-200711-06.xml
https://exchange.xforce.ibmcloud.com/vulnerabilities/35097
https://issues.rpath.com/browse/RPL-1500
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10154
https://rhn.redhat.com/errata/RHSA-2007-0533.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1
http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
http://svn.apache.org/viewvc?view=rev&revision=549159
http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
http://www-1.ibm.com/support/search.wss?rs=0&q=PK49295&apar=only
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
http://www.mandriva.com/security/advisories?name=MDKSA-2007:141
http://www.mandriva.com/security/advisories?name=MDKSA-2007:142
http://www.novell.com/linux/security/advisories/2007_61_apache2.html
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
http://www.redhat.com/support/errata/RHSA-2007-0532.html
http://www.redhat.com/support/errata/RHSA-2007-0557.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://www.securityfocus.com/archive/1/505990/100/0/threaded
http://www.securityfocus.com/bid/24645
http://www.securitytracker.com/id?1018302
http://www.trustix.org/errata/2007/0026/
http://www.ubuntu.com/usn/usn-499-1
http://www.vupen.com/english/advisories/2007/2727
http://www.vupen.com/english/advisories/2007/3283
http://www.vupen.com/english/advisories/2007/3386
http://www.vupen.com/english/advisories/2007/4305
http://www.vupen.com/english/advisories/2008/0233
245112 https://bugzilla.redhat.com/show_bug.cgi?id=245112
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
CVE-2006-5752 https://httpd.apache.org/security/json/CVE-2006-5752.json
CVE-2006-5752 https://nvd.nist.gov/vuln/detail/CVE-2006-5752
GLSA-200711-06 https://security.gentoo.org/glsa/200711-06
RHSA-2007:0532 https://access.redhat.com/errata/RHSA-2007:0532
RHSA-2007:0533 https://access.redhat.com/errata/RHSA-2007:0533
RHSA-2007:0534 https://access.redhat.com/errata/RHSA-2007:0534
RHSA-2007:0556 https://access.redhat.com/errata/RHSA-2007:0556
RHSA-2007:0557 https://access.redhat.com/errata/RHSA-2007:0557
RHSA-2008:0261 https://access.redhat.com/errata/RHSA-2008:0261
RHSA-2008:0263 https://access.redhat.com/errata/RHSA-2008:0263
RHSA-2008:0523 https://access.redhat.com/errata/RHSA-2008:0523
RHSA-2008:0524 https://access.redhat.com/errata/RHSA-2008:0524
RHSA-2010:0602 https://access.redhat.com/errata/RHSA-2010:0602
USN-499-1 https://usn.ubuntu.com/499-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2006-5752
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.93684
EPSS Score 0.12952
Published At May 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.