Eval injection vulnerability in comments.php in Advanced Poll 2.0.2 allows remote attackers to execute arbitrary PHP code via the (1) id, (2) template_set, or (3) action parameter.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://attrition.org/pipermail/vim/2006-October/001080.html - | |
References | () http://secunia.com/advisories/10068 - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/2743 - | |
References | () http://www.securityfocus.com/archive/1/342493 - Exploit | |
References | () http://www.securityfocus.com/archive/1/448007/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/8890 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/13513 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29396 - |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:46
NVD link : CVE-2003-1178
Mitre link : CVE-2003-1178
CVE.ORG link : CVE-2003-1178
JSON object : View
Products Affected
advanced_poll
- advanced_poll
CWE