Vulnerability Details : CVE-2005-1881
Potential exploit
upload.php in YaPiG 0.92b, 0.93u and 0.94u does not properly restrict the file extension for uploaded image files, which allows remote attackers to upload arbitrary files and execute arbitrary PHP code.
Products affected by CVE-2005-1881
- cpe:2.3:a:yapig:yapig:0.92b:*:*:*:*:*:*:*
- cpe:2.3:a:yapig:yapig:0.93u:*:*:*:*:*:*:*
- cpe:2.3:a:yapig:yapig:0.94u:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-1881
2.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-1881
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2005-1881
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-1881
-
http://secunia.com/advisories/15600/
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://www.osvdb.org/17115
404 Not FoundBroken Link;Vendor Advisory
-
http://securitytracker.com/id?1014103
Broken Link;Exploit;Third Party Advisory;VDB Entry;Vendor Advisory
-
http://secwatch.org/advisories/secwatch/20050530_yapig.txt
Broken Link;Vendor Advisory
Jump to