Vulnerability Details : CVE-2005-4506
Nexus Concepts Dev Hound 2.24 and earlier stores username and password information in cleartext in the devhound.tdbd file, which allows local users to gain privileges.
Products affected by CVE-2005-4506
- cpe:2.3:a:nexus_concepts:dev_hound:1.61:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:1.70:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.04:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.11:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.24:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:1.80:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:1.81:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.12:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.13:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:1.52:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:1.60:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.02:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.03:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.22:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.23:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:1.50:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:1.51:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.01:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.20:*:*:*:*:*:*:*
- cpe:2.3:a:nexus_concepts:dev_hound:2.21:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-4506
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-4506
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
References for CVE-2005-4506
Jump to