Логотип exploitDog
bind:CVE-2005-4851
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2005-4851

Количество 4

Количество 4

ubuntu логотип

CVE-2005-4851

больше 19 лет назад

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

CVSS2: 4
EPSS: Низкий
nvd логотип

CVE-2005-4851

больше 19 лет назад

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

CVSS2: 4
EPSS: Низкий
debian логотип

CVE-2005-4851

больше 19 лет назад

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissio ...

CVSS2: 4
EPSS: Низкий
github логотип

GHSA-4v3v-2c52-v3v9

больше 3 лет назад

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2005-4851

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

CVSS2: 4
0%
Низкий
больше 19 лет назад
nvd логотип
CVE-2005-4851

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

CVSS2: 4
0%
Низкий
больше 19 лет назад
debian логотип
CVE-2005-4851

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissio ...

CVSS2: 4
0%
Низкий
больше 19 лет назад
github логотип
GHSA-4v3v-2c52-v3v9

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу