{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T02:42:16.194","vulnerabilities":[{"cve":{"id":"CVE-2005-0523","sourceIdentifier":"cve@mitre.org","published":"2005-05-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in ProZilla 1.3.7.3 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the Location header."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:prozilla:prozilla_download_accelerator:1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"17D4F9A7-FD48-49DF-B00A-B4E6E00C0BB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:prozilla:prozilla_download_accelerator:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"991546AA-154C-423B-B09A-B8A0DE0CCD9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:prozilla:prozilla_download_accelerator:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"0D294781-2F00-4AAB-85F8-807FB0924DBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:prozilla:prozilla_download_accelerator:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"EF8199A3-3789-463C-A8B9-4025F0368733"},{"vulnerable":true,"criteria":"cpe:2.3:a:prozilla:prozilla_download_accelerator:1.3.4:*:*:*:*:*:*:*","matchCriteriaId":"34A3DA7D-AEBC-42F5-905D-78433E50FE1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:prozilla:prozilla_download_accelerator:1.3.5:*:*:*:*:*:*:*","matchCriteriaId":"37B2413C-3186-421F-B5FE-831B559070B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:prozilla:prozilla_download_accelerator:1.3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"FD19C498-C99B-4CFC-9072-EEA1835D98EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:prozilla:prozilla_download_accelerator:1.3.5.2:*:*:*:*:*:*:*","matchCriteriaId":"15A1466C-C264-4FA3-A993-E8EB31232263"},{"vulnerable":true,"criteria":"cpe:2.3:a:prozilla:prozilla_download_accelerator:1.3.6:*:*:*:*:*:*:*","matchCriteriaId":"129AAC35-D66C-4CC3-A8FD-7ED6305EAF35"}]}]}],"references":[{"url":"http://deicide.siyahsapka.org/exploits/proz_ex2.c","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2005/dsa-719","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securiteam.com/exploits/5WP082KEUW.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/12635","source":"cve@mitre.org"},{"url":"http://deicide.siyahsapka.org/exploits/proz_ex2.c","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2005/dsa-719","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securiteam.com/exploits/5WP082KEUW.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/12635","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}