Multiple PHP file include vulnerabilities in ezUpload 2.2 allow remote attackers to execute arbitrary code via the path parameter to (1) initialize.php, (2) customize.php, (3) form.php, or (4) index.php.
References
Configurations
History
20 Nov 2024, 23:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstorm.linuxsecurity.com/0508-exploits/ezuploadRemote.txt - Exploit | |
References | () http://secunia.com/advisories/16434 - Vendor Advisory | |
References | () http://securitytracker.com/id?1014723 - | |
References | () http://www.securiteam.com/exploits/5JP0J15GKU.html - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/14534 - Exploit | |
References | () http://www.vupen.com/english/advisories/2005/1379 - |
Information
Published : 2005-08-17 04:00
Updated : 2024-11-20 23:59
NVD link : CVE-2005-2616
Mitre link : CVE-2005-2616
CVE.ORG link : CVE-2005-2616
JSON object : View
Products Affected
ezupload
- ezupload
CWE