{ "id": "CVE-2005-0012", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", "lastModified": "2024-11-20T23:54:14.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the a_Interface_msg function in Dillo before 0.8.3-r4 allows remote attackers to execute arbitrary code via format string specifiers in a web page." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A94E9AC3-5835-4E79-AB34-637185421292" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FE609C2-1FD6-40AA-B1F7-FED9234431AB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F09C6A52-1942-42EB-AD41-29D34FB82825" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "09F9E9E2-3A5D-4266-A3A9-64CA0B0EF942" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "4FB0B919-02AD-4A21-B2A7-BD25A3FD3DDC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "680ECD1A-67C7-442B-AD53-4310E08FCA57" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8428562-6417-49E8-9DF5-F36DEDB2E880" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E67B9FA0-AFC5-4479-92A8-FEEF3C31F0CE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A25A402-A797-4253-B684-62C4571152EE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "CE5D942B-70E4-4090-AE16-CA6CC0FDBF52" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "A47080B2-A1D9-4DB0-A667-CD04E642845C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "2F43925B-6247-4096-8FFB-AAF8A76B25C7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "6EADF0B3-5F69-4B08-B7D5-5F9240745925" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "188F1458-0C93-4FBC-B111-0EF32C327319" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B0C785B-3582-4493-A22C-E33E9496BFDF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "68220468-E7B4-4D39-BAE7-D69F79F08967" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D187FCC6-AD81-404F-9F69-D58A0AF6D3AB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "819FE3D5-CFFD-48B0-BECB-607E48636F05" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2D3FCCF6-23C3-404A-9091-C669B6E9D81B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A6C9FBB-4CF3-4B7B-95EA-126ADFDA9747" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "535320B4-9BE9-4395-80A4-9A857E46837A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3F398046-E2C3-444A-9899-191043E90225" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DB1BD70-F755-4280-916F-AFFF0B18D581" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE1A226-9F33-4906-8227-FA97DCC4E509" }, { "vulnerable": true, "criteria": "cpe:2.3:a:dillo:dillo_web_browser:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCC05DE5-659B-4C0F-A2B3-B941698F2341" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/13760/", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/13764", "source": "cve@mitre.org" }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-11.xml", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/12203", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18807", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/13760/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/13764", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-11.xml", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/12203", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18807", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }