CVE-2007-1394
Published Mar 10, 2007
Last updated 7 years ago
Overview
- Description
- Direct static code injection vulnerability in startsession.php in Flat Chat 2.0 allows remote attackers to execute arbitrary PHP code via the Chat Name field, which is inserted into online.txt and included by users.php. NOTE: some of these details are obtained from third party information.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:flat_chat:flat_chat:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83A6083D-094D-4AB0-8F0C-85BAF1760BAC" } ], "operator": "OR" } ] } ]