Search for vulnerabilities
Vulnerability details: VCID-zqct-1b9n-aaap
Vulnerability ID VCID-zqct-1b9n-aaap
Aliases CVE-2007-4572
Summary Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual MODERATE http://docs.info.apple.com/article.html?artnum=307179
generic_textual MODERATE http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
rhas Critical https://access.redhat.com/errata/RHSA-2007:1013
rhas Critical https://access.redhat.com/errata/RHSA-2007:1016
rhas Critical https://access.redhat.com/errata/RHSA-2007:1017
epss 0.12359 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.12359 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.12359 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.13042 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.13302 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.13302 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.13302 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.13302 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.13302 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.13302 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.13302 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.13302 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.13302 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.27399 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.47355 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.47355 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.47355 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
epss 0.47355 https://api.first.org/data/v1/epss?cve=CVE-2007-4572
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=294631
generic_textual MODERATE http://secunia.com/advisories/28136
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2007-4572
generic_textual MODERATE http://www.us-cert.gov/cas/techalerts/TA07-352A.html
generic_textual MODERATE http://www.vupen.com/english/advisories/2007/4238
Reference id Reference type URL
http://docs.info.apple.com/article.html?artnum=307179
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
http://lists.vmware.com/pipermail/security-announce/2008/000002.html
http://marc.info/?l=bugtraq&m=120524782005154&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4572.json
https://api.first.org/data/v1/epss?cve=CVE-2007-4572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572
http://secunia.com/advisories/27450
http://secunia.com/advisories/27679
http://secunia.com/advisories/27682
http://secunia.com/advisories/27691
http://secunia.com/advisories/27701
http://secunia.com/advisories/27720
http://secunia.com/advisories/27731
http://secunia.com/advisories/27787
http://secunia.com/advisories/27927
http://secunia.com/advisories/28136
http://secunia.com/advisories/28368
http://secunia.com/advisories/29341
http://secunia.com/advisories/30484
http://secunia.com/advisories/30736
http://secunia.com/advisories/30835
http://securitytracker.com/id?1018954
https://exchange.xforce.ibmcloud.com/vulnerabilities/38501
https://issues.rpath.com/browse/RPL-1894
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.447739
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11132
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5643
http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1
https://usn.ubuntu.com/544-1/
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html
http://us1.samba.org/samba/security/CVE-2007-4572.html
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
http://www.debian.org/security/2007/dsa-1409
http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:224
http://www.novell.com/linux/security/advisories/2007_65_samba.html
http://www.redhat.com/support/errata/RHSA-2007-1013.html
http://www.redhat.com/support/errata/RHSA-2007-1016.html
http://www.redhat.com/support/errata/RHSA-2007-1017.html
http://www.securityfocus.com/archive/1/485936/100/0/threaded
http://www.securityfocus.com/archive/1/486859/100/0/threaded
http://www.securityfocus.com/bid/26454
http://www.ubuntu.com/usn/usn-544-2
http://www.ubuntu.com/usn/usn-617-1
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
http://www.vmware.com/security/advisories/VMSA-2008-0001.html
http://www.vupen.com/english/advisories/2007/3869
http://www.vupen.com/english/advisories/2007/4238
http://www.vupen.com/english/advisories/2008/0064
http://www.vupen.com/english/advisories/2008/0859/references
http://www.vupen.com/english/advisories/2008/1712/references
http://www.vupen.com/english/advisories/2008/1908
294631 https://bugzilla.redhat.com/show_bug.cgi?id=294631
451385 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=451385
cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
CVE-2007-4572 https://nvd.nist.gov/vuln/detail/CVE-2007-4572
GLSA-200711-29 https://security.gentoo.org/glsa/200711-29
RHSA-2007:1013 https://access.redhat.com/errata/RHSA-2007:1013
RHSA-2007:1016 https://access.redhat.com/errata/RHSA-2007:1016
RHSA-2007:1017 https://access.redhat.com/errata/RHSA-2007:1017
USN-544-2 https://usn.ubuntu.com/544-2/
USN-617-1 https://usn.ubuntu.com/617-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2007-4572
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.95654
EPSS Score 0.12359
Published At Dec. 11, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.