FlatNuke 2.5.3 allows remote attackers to cause a denial of service or obtain sensitive information via (1) a direct request to foot_news.php, which triggers an infinite loop, or (2) direct requests to unknown scripts, which reveals the web document root in an error message.
References
Link | Resource |
---|---|
http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256 | Product |
http://secunia.com/advisories/15603 | Broken Link |
http://securitytracker.com/id?1014114 | Broken Link Exploit Third Party Advisory VDB Entry |
http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt | Broken Link Patch Vendor Advisory |
http://www.vupen.com/english/advisories/2005/0697 | Broken Link |
Configurations
History
25 Jan 2024, 21:10
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-425 | |
CPE | cpe:2.3:a:flatnuke:flatnuke:1.0:*:*:*:*:*:*:* cpe:2.3:a:flatnuke:flatnuke:1.6:*:*:*:*:*:*:* cpe:2.3:a:flatnuke:flatnuke:1.8:*:*:*:*:*:*:* cpe:2.3:a:flatnuke:flatnuke:1.7:*:*:*:*:*:*:* cpe:2.3:a:flatnuke:flatnuke:2.0:*:*:*:*:*:*:* |
|
References | (SECUNIA) http://secunia.com/advisories/15603 - Broken Link | |
References | (CONFIRM) http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256 - Product | |
References | (MISC) http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt - Broken Link, Patch, Vendor Advisory | |
References | (SECTRACK) http://securitytracker.com/id?1014114 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2005/0697 - Broken Link |
Information
Published : 2005-06-09 04:00
Updated : 2024-02-28 10:42
NVD link : CVE-2005-1892
Mitre link : CVE-2005-1892
CVE.ORG link : CVE-2005-1892
JSON object : View
Products Affected
flatnuke
- flatnuke
CWE
CWE-425
Direct Request ('Forced Browsing')