Format string vulnerability in the a_Interface_msg function in Dillo before 0.8.3-r4 allows remote attackers to execute arbitrary code via format string specifiers in a web page.
References
| Link | Resource |
|---|---|
| http://secunia.com/advisories/13760/ | Vendor Advisory |
| http://secunia.com/advisories/13764 | Not Applicable |
| http://www.gentoo.org/security/en/glsa/glsa-200501-11.xml | Vendor Advisory |
| http://www.securityfocus.com/bid/12203 | Broken Link |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/18807 | Third Party Advisory |
| http://secunia.com/advisories/13760/ | Vendor Advisory |
| http://secunia.com/advisories/13764 | Not Applicable |
| http://www.gentoo.org/security/en/glsa/glsa-200501-11.xml | Vendor Advisory |
| http://www.securityfocus.com/bid/12203 | Broken Link |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/18807 | Third Party Advisory |
Configurations
History
27 Mar 2026, 20:55
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:dillo:dillo_web_browser:0.8.3:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.8.2:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.2.3:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.6.5:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.4:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.2.1:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.7.2:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.8.1:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.6.6:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.6.1:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.6.2:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.8:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.7.1:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.7:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.3.1:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.7.1.2:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.6.4:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.3:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.2.4:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.5.1:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.6:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.2.2:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.2:*:*:*:*:*:*:* cpe:2.3:a:dillo:dillo_web_browser:0.7.3:*:*:*:*:*:*:* |
cpe:2.3:a:dillo:dillo:*:*:*:*:*:*:*:* |
| References | () http://secunia.com/advisories/13764 - Not Applicable | |
| References | () http://www.securityfocus.com/bid/12203 - Broken Link | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18807 - Third Party Advisory | |
| First Time |
Dillo dillo
|
20 Nov 2024, 23:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://secunia.com/advisories/13760/ - Vendor Advisory | |
| References | () http://secunia.com/advisories/13764 - | |
| References | () http://www.gentoo.org/security/en/glsa/glsa-200501-11.xml - Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/12203 - Exploit, Patch | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18807 - |
Information
Published : 2005-05-02 04:00
Updated : 2026-03-27 20:55
NVD link : CVE-2005-0012
Mitre link : CVE-2005-0012
CVE.ORG link : CVE-2005-0012
JSON object : View
Products Affected
dillo
- dillo
CWE
