Unrated severityNVD Advisory· Published May 2, 2005· Updated Apr 16, 2026
CVE-2005-1121
CVE-2005-1121
Description
Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL.
Affected products
4cpe:2.3:a:igor_khasilev:oops_proxy_server:1.4.22:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:igor_khasilev:oops_proxy_server:1.4.22:*:*:*:*:*:*:*
- cpe:2.3:a:igor_khasilev:oops_proxy_server:1.5.19:*:*:*:*:*:*:*
- cpe:2.3:a:igor_khasilev:oops_proxy_server:1.5.53:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- security.gentoo.org/glsa/glsa-200505-02.xmlnvdPatchVendor Advisory
- www.debian.org/security/2005/dsa-726nvdPatchVendor Advisory
- www.securityfocus.com/bid/13172nvdPatch
- rst.void.ru/papers/advisory24.txtnvdExploitPatchVendor Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/20191nvd
News mentions
0No linked articles in our index yet.