CVE-2005-0088
Published May 2, 2005
Last updated 6 years ago
Overview
- Description
- The publisher handler for mod_python 2.7.8 and earlier allows remote attackers to obtain access to restricted objects via a crafted URL.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:mod_python:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0359C038-B61F-4640-ADFA-7B8038DFCD9B", "versionEndIncluding": "2.7.8" }, { "criteria": "cpe:2.3:a:apache:mod_python:1.9a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5509C23E-30C8-47E5-A0D6-5DBABD357203" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "253A9B1A-5E40-4BF3-A181-DD8EC86EB119" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CD7D5B0-DB5C-4C92-B701-84274A2D8FEE" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76C96ED2-1B85-4B1F-AAAB-5FC90BF5AB7F" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "490DC20E-7A70-4095-82D2-2E8ED23C5BE8" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B27C447F-2883-464D-AC9C-22AFF1278E8F" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E83757F-81A1-48CF-93FE-3F2B8C2E9EAF" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F845DD2D-7DCB-4CB4-A70C-ABE10DC136D8" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E26E30A3-747D-491D-9930-63488AE5E768" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "899F6DBB-C557-4C43-8573-217134A1D44B" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B29FD9AA-7B11-4B7D-BA40-B7F488D83892" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC9E0311-B2B6-4770-8393-8A65CC3D5BF9" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5D35BAD-EE65-46E7-845A-DE58D8A1EFDB" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "310A5F62-EF40-462A-B1CD-251704B74C2F" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "399203BA-6661-4451-A667-1EBCC0310FA3" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9604D18-BFA4-4725-8810-8D2BAD9E0DF1" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7BA1FA8-74C2-4473-B121-C9C958547501" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "695F589B-1CEA-4974-9E47-FB7E5DF5B919" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1045B136-428A-461C-98BA-3E4C818DE27E" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2BFBBA5-750F-43B4-BE5F-BDBA2E2FDF5F" }, { "criteria": "cpe:2.3:a:apache:mod_python:2.7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23C3FE2B-C056-4FE5-A8AC-A0BC9B69E454" } ], "operator": "OR" } ] } ]