Multiple PHP remote file inclusion vulnerabilities in (1) print_category.php, (2) login.php, (3) setup.php, (4) ask_password.php, or (5) error.php in ZeroBoard 4.1pl5 and earlier allow remote attackers to execute arbitrary PHP code by modifying the dir parameter to reference a URL on a remote web server that contains the code.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=110565373407474&w=2 - | |
References | () http://secunia.com/advisories/13769 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1012884 - | |
References | () http://www.osvdb.org/12928 - | |
References | () http://www.osvdb.org/12929 - | |
References | () http://www.osvdb.org/12930 - | |
References | () http://www.osvdb.org/12931 - | |
References | () http://www.osvdb.org/12932 - | |
References | () http://www.securityfocus.com/bid/12206 - Exploit | |
References | () http://www.securityfocus.com/bid/12258 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18892 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18893 - |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:55
NVD link : CVE-2005-0380
Mitre link : CVE-2005-0380
CVE.ORG link : CVE-2005-0380
JSON object : View
Products Affected
zeroboard
- zeroboard
CWE