Search for vulnerabilities
Vulnerability details: VCID-wmsx-921j-aaam
Vulnerability ID VCID-wmsx-921j-aaam
Aliases CVE-2012-3499
Summary Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://httpd.apache.org/security/vulnerabilities_24.html
generic_textual MODERATE http://marc.info/?l=bugtraq&m=136612293908376&w=2
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-1207.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-1208.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-1209.html
rhas Moderate https://access.redhat.com/errata/RHSA-2013:0815
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1011
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1012
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1013
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1207
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1208
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1209
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.00772 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.12489 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.12489 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.12489 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.12489 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.12489 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.21794 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.24331 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.24331 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.24331 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.24331 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.24331 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.24331 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.24331 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.24331 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.24331 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.24331 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
epss 0.29906 https://api.first.org/data/v1/epss?cve=CVE-2012-3499
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=915883
apache_httpd low https://httpd.apache.org/security/json/CVE-2012-3499.json
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2012-3499
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
generic_textual MODERATE http://www.securityfocus.com/bid/64758
Reference id Reference type URL
http://httpd.apache.org/security/vulnerabilities_22.html
http://httpd.apache.org/security/vulnerabilities_24.html
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101196.html
http://marc.info/?l=bugtraq&m=136612293908376&w=2
http://rhn.redhat.com/errata/RHSA-2013-0815.html
http://rhn.redhat.com/errata/RHSA-2013-1207.html
http://rhn.redhat.com/errata/RHSA-2013-1208.html
http://rhn.redhat.com/errata/RHSA-2013-1209.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3499.json
https://api.first.org/data/v1/epss?cve=CVE-2012-3499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1048
http://secunia.com/advisories/55032
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19312
http://support.apple.com/kb/HT5880
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_info.c?r1=1225799&r2=1413732&diff_format=h
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c?r1=1389564&r2=1413732&diff_format=h
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/ldap/util_ldap_cache_mgr.c?r1=1209766&r2=1418752&diff_format=h
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/mappers/mod_imagemap.c?r1=1398480&r2=1413732&diff_format=h
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_ftp.c?r1=1404625&r2=1413732&diff_format=h
http://www.debian.org/security/2013/dsa-2637
http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
http://www.securityfocus.com/bid/58165
http://www.securityfocus.com/bid/64758
915883 https://bugzilla.redhat.com/show_bug.cgi?id=915883
cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
CVE-2012-3499 https://httpd.apache.org/security/json/CVE-2012-3499.json
CVE-2012-3499 https://nvd.nist.gov/vuln/detail/CVE-2012-3499
RHSA-2013:0815 https://access.redhat.com/errata/RHSA-2013:0815
RHSA-2013:1011 https://access.redhat.com/errata/RHSA-2013:1011
RHSA-2013:1012 https://access.redhat.com/errata/RHSA-2013:1012
RHSA-2013:1013 https://access.redhat.com/errata/RHSA-2013:1013
RHSA-2013:1207 https://access.redhat.com/errata/RHSA-2013:1207
RHSA-2013:1208 https://access.redhat.com/errata/RHSA-2013:1208
RHSA-2013:1209 https://access.redhat.com/errata/RHSA-2013:1209
USN-1765-1 https://usn.ubuntu.com/1765-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2012-3499
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.77589
EPSS Score 0.00563
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.