Eval injection vulnerability in Double Choco Latte before 0.9.4.3 allows remote attackers to execute arbitrary PHP code via the menuAction variable in (1) functions.inc.php or (2) main.php, which causes code to be injected into an eval statement.
References
Link | Resource |
---|---|
http://secunia.com/advisories/14688 | Patch Vendor Advisory |
http://securitytracker.com/id?1013559 | Patch Vendor Advisory |
http://sourceforge.net/project/shownotes.php?release_id=315144 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19806 | |
http://secunia.com/advisories/14688 | Patch Vendor Advisory |
http://securitytracker.com/id?1013559 | Patch Vendor Advisory |
http://sourceforge.net/project/shownotes.php?release_id=315144 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19806 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/14688 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1013559 - Patch, Vendor Advisory | |
References | () http://sourceforge.net/project/shownotes.php?release_id=315144 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19806 - |
Information
Published : 2005-03-24 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-0887
Mitre link : CVE-2005-0887
CVE.ORG link : CVE-2005-0887
JSON object : View
Products Affected
michael_dean
- double_choco_latte
CWE