Vulnerability Details : CVE-2005-1121
Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL.
Vulnerability category: Execute code
Products affected by CVE-2005-1121
- cpe:2.3:a:igor_khasilev:oops_proxy_server:1.4.22:*:*:*:*:*:*:*
- cpe:2.3:a:igor_khasilev:oops_proxy_server:1.5.19:*:*:*:*:*:*:*
- cpe:2.3:a:igor_khasilev:oops_proxy_server:1.5.53:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-1121
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-1121
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2005-1121
-
http://www.securityfocus.com/bid/13172
Patch
-
http://www.debian.org/security/2005/dsa-726
Patch;Vendor Advisory
-
http://security.gentoo.org/glsa/glsa-200505-02.xml
Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/20191
-
http://rst.void.ru/papers/advisory24.txt
Exploit;Patch;Vendor Advisory
Jump to