Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-1921

Опубликовано: 05 июл. 2005
Источник: ubuntu
Приоритет: untriaged
EPSS Высокий
CVSS2: 7.5

Описание

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

РелизСтатусПримечание
dapper

released

1.0.0.009.dfsg-3-4
devel

released

1.0.0.009.dfsg-3-4
edgy

released

1.0.0.009.dfsg-3-4
feisty

released

1.0.0.009.dfsg-3-4
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

DNE

edgy

not-affected

feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.9
devel

released

5.2.3-1ubuntu5
edgy

released

5.1.6-1ubuntu2.6
feisty

released

5.2.1-0ubuntu1.4
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

EPSS

Процентиль: 99%
0.86898
Высокий

7.5 High

CVSS2

Связанные уязвимости

redhat
почти 20 лет назад

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

nvd
почти 20 лет назад

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

debian
почти 20 лет назад

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XM ...

github
около 3 лет назад

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

EPSS

Процентиль: 99%
0.86898
Высокий

7.5 High

CVSS2