Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2009-5024

ViewVC before 1.1.11 allows remote attackers to bypass the cvsdb row_limit configuration setting, and consequently conduct resource-consumption attacks, via the limit parameter, as demonstrated by a "query revision history" request.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 65.0%
CVSS Severity
CVSS v2 Score 5.0
References
Products affected by CVE-2009-5024
  • Viewvc » Viewvc » Version: N/A
    cpe:2.3:a:viewvc:viewvc:-
  • Viewvc » Viewvc » Version: 0.3.0
    cpe:2.3:a:viewvc:viewvc:0.3.0
  • Viewvc » Viewvc » Version: 0.4.0
    cpe:2.3:a:viewvc:viewvc:0.4.0
  • Viewvc » Viewvc » Version: 0.5.0
    cpe:2.3:a:viewvc:viewvc:0.5.0
  • Viewvc » Viewvc » Version: 0.6.0
    cpe:2.3:a:viewvc:viewvc:0.6.0
  • Viewvc » Viewvc » Version: 0.7.0
    cpe:2.3:a:viewvc:viewvc:0.7.0
  • Viewvc » Viewvc » Version: 0.8
    cpe:2.3:a:viewvc:viewvc:0.8
  • Viewvc » Viewvc » Version: 0.9
    cpe:2.3:a:viewvc:viewvc:0.9
  • Viewvc » Viewvc » Version: 0.9.1
    cpe:2.3:a:viewvc:viewvc:0.9.1
  • Viewvc » Viewvc » Version: 0.9.2
    cpe:2.3:a:viewvc:viewvc:0.9.2
  • Viewvc » Viewvc » Version: 0.9.3
    cpe:2.3:a:viewvc:viewvc:0.9.3
  • Viewvc » Viewvc » Version: 0.9.4
    cpe:2.3:a:viewvc:viewvc:0.9.4
  • Viewvc » Viewvc » Version: 1.0.0
    cpe:2.3:a:viewvc:viewvc:1.0.0
  • Viewvc » Viewvc » Version: 1.0.1
    cpe:2.3:a:viewvc:viewvc:1.0.1
  • Viewvc » Viewvc » Version: 1.0.10
    cpe:2.3:a:viewvc:viewvc:1.0.10
  • Viewvc » Viewvc » Version: 1.0.11
    cpe:2.3:a:viewvc:viewvc:1.0.11
  • Viewvc » Viewvc » Version: 1.0.12
    cpe:2.3:a:viewvc:viewvc:1.0.12
  • Viewvc » Viewvc » Version: 1.0.13
    cpe:2.3:a:viewvc:viewvc:1.0.13
  • Viewvc » Viewvc » Version: 1.0.14
    cpe:2.3:a:viewvc:viewvc:1.0.14
  • Viewvc » Viewvc » Version: 1.0.2
    cpe:2.3:a:viewvc:viewvc:1.0.2
  • Viewvc » Viewvc » Version: 1.0.3
    cpe:2.3:a:viewvc:viewvc:1.0.3
  • Viewvc » Viewvc » Version: 1.0.4
    cpe:2.3:a:viewvc:viewvc:1.0.4
  • Viewvc » Viewvc » Version: 1.0.5
    cpe:2.3:a:viewvc:viewvc:1.0.5
  • Viewvc » Viewvc » Version: 1.0.6
    cpe:2.3:a:viewvc:viewvc:1.0.6
  • Viewvc » Viewvc » Version: 1.0.7
    cpe:2.3:a:viewvc:viewvc:1.0.7
  • Viewvc » Viewvc » Version: 1.0.8
    cpe:2.3:a:viewvc:viewvc:1.0.8
  • Viewvc » Viewvc » Version: 1.0.9
    cpe:2.3:a:viewvc:viewvc:1.0.9
  • Viewvc » Viewvc » Version: 1.1.0
    cpe:2.3:a:viewvc:viewvc:1.1.0
  • Viewvc » Viewvc » Version: 1.1.1
    cpe:2.3:a:viewvc:viewvc:1.1.1
  • Viewvc » Viewvc » Version: 1.1.10
    cpe:2.3:a:viewvc:viewvc:1.1.10
  • Viewvc » Viewvc » Version: 1.1.2
    cpe:2.3:a:viewvc:viewvc:1.1.2
  • Viewvc » Viewvc » Version: 1.1.3
    cpe:2.3:a:viewvc:viewvc:1.1.3
  • Viewvc » Viewvc » Version: 1.1.4
    cpe:2.3:a:viewvc:viewvc:1.1.4
  • Viewvc » Viewvc » Version: 1.1.5
    cpe:2.3:a:viewvc:viewvc:1.1.5
  • Viewvc » Viewvc » Version: 1.1.6
    cpe:2.3:a:viewvc:viewvc:1.1.6
  • Viewvc » Viewvc » Version: 1.1.7
    cpe:2.3:a:viewvc:viewvc:1.1.7
  • Viewvc » Viewvc » Version: 1.1.8
    cpe:2.3:a:viewvc:viewvc:1.1.8
  • Viewvc » Viewvc » Version: 1.1.9
    cpe:2.3:a:viewvc:viewvc:1.1.9


Contact Us

Shodan ® - All rights reserved