Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-0089

Опубликовано: 02 мая 2005
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 7.5

Описание

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.

РелизСтатусПримечание
dapper

released

2.2.3dfsg-4
devel

DNE

edgy

DNE

feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.3.5-9ubuntu1.2
devel

DNE

edgy

DNE

feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.4.3-0ubuntu6
devel

released

2.4.4~c1-0ubuntu1
edgy

released

2.4.4~c1-0ubuntu1
feisty

released

2.4.4~c1-0ubuntu1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

2.5-2ubuntu2
edgy

released

2.5-2ubuntu2
feisty

released

2.5-2ubuntu2
upstream

needs-triage

Показывать по

EPSS

Процентиль: 93%
0.09829
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 20 лет назад

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.

nvd
около 20 лет назад

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.

debian
около 20 лет назад

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, ...

github
около 3 лет назад

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.

EPSS

Процентиль: 93%
0.09829
Низкий

7.5 High

CVSS2