Логотип exploitDog
bind:CVE-2005-4851
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2005-4851

Количество 4

Количество 4

ubuntu логотип

CVE-2005-4851

около 20 лет назад

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

CVSS2: 4
EPSS: Низкий
nvd логотип

CVE-2005-4851

около 20 лет назад

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

CVSS2: 4
EPSS: Низкий
debian логотип

CVE-2005-4851

около 20 лет назад

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissio ...

CVSS2: 4
EPSS: Низкий
github логотип

GHSA-4v3v-2c52-v3v9

почти 4 года назад

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2005-4851

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

CVSS2: 4
0%
Низкий
около 20 лет назад
nvd логотип
CVE-2005-4851

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

CVSS2: 4
0%
Низкий
около 20 лет назад
debian логотип
CVE-2005-4851

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissio ...

CVSS2: 4
0%
Низкий
около 20 лет назад
github логотип
GHSA-4v3v-2c52-v3v9

eZ publish 3.4.4 through 3.7 before 20050722 applies certain permissions on the node level, which allows remote authenticated users to bypass the original permissions on embedded objects in XML fields and read these objects.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу