Show plain JSON{"id": "CVE-2005-1326", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2005-05-02T04:00:00.000", "references": [{"url": "http://secunia.com/advisories/15110", "source": "cve@mitre.org"}, {"url": "http://sourceforge.net/project/shownotes.php?release_id=323254", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/15830", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/15110", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://sourceforge.net/project/shownotes.php?release_id=323254", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/15830", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in VooDoo cIRCle BOTNET before 1.0.33 allows remote authenticated attackers to cause a denial of service (client crash) via a crafted packet."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A598719-A542-48B8-87CC-D494DF215028"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89BA0BF4-4B92-43B2-9389-0E9873564922"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30724F53-0AA2-495E-8348-46352666E9B3"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E611909-BBE6-4FA9-817F-0C01F1707358"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33D3EDDF-41C8-4781-966D-6A2FF4C5A397"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B75E0C78-1130-49B6-BF07-C5510652023B"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D5F6155-F593-4C10-94FD-7ED788F93B40"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.27:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F02ADDE-B663-4A89-B7CD-C694B713CA3F"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.28:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CC9ABF3-AA25-450B-8A94-529403D81A19"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBECE6BE-BE79-4003-8FAD-AF3EE6A00ED2"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D415A312-7EC6-4B31-9F53-A952D822EB93"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6630A66E-6BFD-4150-B4C6-1539EB76602A"}, {"criteria": "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.32:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42A6B104-870F-4F3E-BC07-1B0753156542"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}