register.cgi in Ikonboard 2.1.7b and earlier allows remote attackers to execute arbitrary commands via the SEND_MAIL parameter, which overwrites an internal program variable that references a program to be executed.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-12/0483.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/2157 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5819 | |
http://archives.neohapsis.com/archives/bugtraq/2000-12/0483.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/2157 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5819 |
Configurations
History
20 Nov 2024, 23:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2000-12/0483.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/2157 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/5819 - |
Information
Published : 2001-02-12 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-0076
Mitre link : CVE-2001-0076
CVE.ORG link : CVE-2001-0076
JSON object : View
Products Affected
ikonboard.com
- ikonboard
CWE