Vulnerability Details : CVE-2004-0522
Gallery 1.4.3 and earlier allows remote attackers to bypass authentication and obtain Gallery administrator privileges.
Products affected by CVE-2004-0522
- cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
- cpe:2.3:a:gallery_project:gallery:1.4_pl1:*:*:*:*:*:*:*
- cpe:2.3:a:gallery_project:gallery:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gallery_project:gallery:1.4_pl2:*:*:*:*:*:*:*
- cpe:2.3:a:gallery_project:gallery:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gallery_project:gallery:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:gallery_project:gallery:1.4.3_pl1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0522
2.97%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0522
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2004-0522
-
http://www.securityfocus.com/bid/10451
Patch;Vendor Advisory
-
http://security.gentoo.org/glsa/glsa-200406-10.xml
Gallery: Privilege escalation vulnerability (GLSA 200406-10) — Gentoo security
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/16301
-
http://secunia.com/advisories/11752
-
http://www.debian.org/security/2004/dsa-512
Debian -- The Universal Operating SystemPatch;Vendor Advisory
Jump to