Show plain JSON{"id": "CVE-2004-1031", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2005-03-01T05:00:00.000", "references": [{"url": "http://security.gentoo.org/glsa/glsa-200411-27.xml", "source": "cve@mitre.org"}, {"url": "http://www.idefense.com/application/poi/display?id=157&type=vulnerabilities&flashstatus=false", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/11684", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18076", "source": "cve@mitre.org"}, {"url": "http://security.gentoo.org/glsa/glsa-200411-27.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.idefense.com/application/poi/display?id=157&type=vulnerabilities&flashstatus=false", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/11684", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18076", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:thibault_godouet:fcron:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CC6BD83-D454-4FD8-904D-0A7C083F7AD5"}, {"criteria": "cpe:2.3:a:thibault_godouet:fcron:2.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2688EE86-C1A6-466B-B52E-11CFAE118335"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "647BA336-5538-4972-9271-383A0EC9378E"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}