Vulnerability Details : CVE-2005-3927
Potential exploit
Multiple directory traversal vulnerabilities in GuppY 4.5.9 and earlier allow remote attackers to read and include arbitrary files via (1) the meskin parameter to admin/editorTypetool.php, or the lng parameter to the in admin/inc scripts (2) archbatch.php, (3) dbbatch.php, and (4) nwlmail.php.
Vulnerability category: Directory traversal
Products affected by CVE-2005-3927
- cpe:2.3:a:guppy:guppy:4.5:*:*:*:*:*:*:*
- cpe:2.3:a:guppy:guppy:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:guppy:guppy:4.5.3a:*:*:*:*:*:*:*
- cpe:2.3:a:guppy:guppy:4.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:guppy:guppy:4.5.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-3927
19.58%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-3927
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST |
References for CVE-2005-3927
-
http://rgod.altervista.org/guppy459_xpl.html
Exploit;Vendor Advisory
-
http://securityreason.com/securityalert/212
-
http://www.securityfocus.com/archive/1/417899/100/0/threaded
-
http://securitytracker.com/id?1015279
Exploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/23319
-
http://www.vupen.com/english/advisories/2005/2635
-
http://secunia.com/advisories/17790
Vendor Advisory
-
http://www.securityfocus.com/bid/15610
Exploit
Jump to