CVE-2004-0180
 
Severity Score
2.6
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The client for CVS before 1.11 allows a remote malicious CVS server to create arbitrary files using certain RCS diff files that use absolute pathnames during checkouts or updates, a different vulnerability than CVE-2004-0405.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2004-02-25 CVE Reserved
- 2004-04-16 CVE Published
- 2024-08-08 CVE Updated
- 2024-09-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (25)
URL | Tag | Source |
---|---|---|
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/002_cvs.patch | X_refsource_confirm | |
http://secunia.com/advisories/11368 | Third Party Advisory | |
http://secunia.com/advisories/11371 | Third Party Advisory | |
http://secunia.com/advisories/11374 | Third Party Advisory | |
http://secunia.com/advisories/11375 | Third Party Advisory | |
http://secunia.com/advisories/11377 | Third Party Advisory | |
http://secunia.com/advisories/11380 | Third Party Advisory | |
http://secunia.com/advisories/11391 | Third Party Advisory | |
http://secunia.com/advisories/11400 | Third Party Advisory | |
http://secunia.com/advisories/11405 | Third Party Advisory | |
http://secunia.com/advisories/11548 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15864 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1042 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9462 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:07.cvs.asc | 2018-05-03 | |
http://www.debian.org/security/2004/dsa-486 | 2018-05-03 | |
http://www.redhat.com/support/errata/RHSA-2004-153.html | 2018-05-03 | |
http://www.redhat.com/support/errata/RHSA-2004-154.html | 2018-05-03 |