Vulnerability Details : CVE-2005-2319
PHP remote file include vulnerability in Yawp library 1.0.6 and earlier, as used in YaWiki and possibly other products, allows remote attackers to include arbitrary files via the _Yawp[conf_path] parameter.
Products affected by CVE-2005-2319
- cpe:2.3:a:yawp:yawp:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:yawp:yawp:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:yawp:yawp:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:yawp:yawp:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:yawp:yawp:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:yawp:yawp:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:yawp:yawp:1.0.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2319
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2319
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2005-2319
-
http://www.hardened-php.net/advisory-102005.php
Patch;Vendor Advisory
-
http://secunia.com/advisories/16049
-
http://www.securityfocus.com/archive/1/404948
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/14237
Patch
-
http://phpyawp.com/yawiki/index.php?page=ChangeLog
Jump to