CVE-2005-1121
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/05/2005
Last modified:
03/04/2025
Description
Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:igor_khasilev:oops_proxy_server:1.4.22:*:*:*:*:*:*:* | ||
| cpe:2.3:a:igor_khasilev:oops_proxy_server:1.5.19:*:*:*:*:*:*:* | ||
| cpe:2.3:a:igor_khasilev:oops_proxy_server:1.5.53:*:*:*:*:*:*:* | ||
| cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rst.void.ru/papers/advisory24.txt
- http://security.gentoo.org/glsa/glsa-200505-02.xml
- http://www.debian.org/security/2005/dsa-726
- http://www.securityfocus.com/bid/13172
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20191
- http://rst.void.ru/papers/advisory24.txt
- http://security.gentoo.org/glsa/glsa-200505-02.xml
- http://www.debian.org/security/2005/dsa-726
- http://www.securityfocus.com/bid/13172
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20191



