CVE-2005-0175
Published Feb 7, 2005
Last updated 7 years ago
Overview
- Description
- Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:squid:squid:2.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF792263-D6ED-4AD1-98C1-0E22670EF91A" }, { "criteria": "cpe:2.3:a:squid:squid:2.5.stable1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7183658C-0CDE-40B1-B203-8C365193724B" }, { "criteria": "cpe:2.3:a:squid:squid:2.5.stable2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9C73406-9582-40F7-AFD9-7E9D6D94DE39" }, { "criteria": "cpe:2.3:a:squid:squid:2.5.stable3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EDB690A-E0EF-4B11-83D7-B4A4C6B52DD6" }, { "criteria": "cpe:2.3:a:squid:squid:2.5.stable4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D3F889C-2A50-4B91-B74D-1D32A2CAFFA5" }, { "criteria": "cpe:2.3:a:squid:squid:2.5.stable5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCE944B8-B660-4FDB-A3F2-81F908329D88" }, { "criteria": "cpe:2.3:a:squid:squid:2.5.stable6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75436484-5FCD-45D3-9262-63301A2024B9" }, { "criteria": "cpe:2.3:a:squid:squid:2.5.stable7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8D59FA7-FD38-406A-923F-68297CC4B767" }, { "criteria": "cpe:2.3:a:squid:squid:2.5_.stable1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62C66D46-D3C7-4FCC-B80D-EBA542E77C13" }, { "criteria": "cpe:2.3:a:squid:squid:2.5_.stable3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0B6C02F-D194-4CA7-9DEC-A436A4E8C99C" }, { "criteria": "cpe:2.3:a:squid:squid:2.5_.stable4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B7D86CB-EEAD-4C40-855D-E98E4ED8B58F" }, { "criteria": "cpe:2.3:a:squid:squid:2.5_.stable5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F59C3E7-0AC0-4886-B4B4-56904AC93C55" }, { "criteria": "cpe:2.3:a:squid:squid:2.5_.stable6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5207FB50-946A-4AB2-AED9-9BA78B88F1F3" }, { "criteria": "cpe:2.3:a:squid:squid:2.5_stable3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F8096AB-99B9-4D08-AA13-6AFF0DD65BD4" }, { "criteria": "cpe:2.3:a:squid:squid:2.5_stable4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A356D04A-7882-4A14-AD5F-2079EA0E79C7" }, { "criteria": "cpe:2.3:a:squid:squid:2.5_stable9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A4C4F43-0807-400C-890B-D13BF5B9BF72" } ], "operator": "OR" } ] } ]