CVE-2005-2893
Published Sep 14, 2005
Last updated 7 years ago
Overview
- Description
- Direct static code injection vulnerability in setcookie.php in PBLang 4.65, and possibly earlier versions, allows remote attackers to execute arbitrary PHP code via the username (u parameter), which is directly injected into a file that is later executed upon login.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:pblang:pblang:4.65:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8178A159-1008-4DC9-A7EC-17C051D21896" } ], "operator": "OR" } ] } ]