7.5
CVSSv2

CVE-2005-0862

Published: 02/05/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple PHP remote file inclusion vulnerabilities in PHPOpenChat 3.0.1 and previous versions allow remote malicious users to execute arbitrary PHP code via the phpbb_root_path parameter to (1) poc_loginform.php or (2) phpbb/poc.php, the poc_root_path parameter to (3) phpbb/poc.php, (4) phpnuke/ENGLISH_poc.php, (5) phpnuke/poc.php, or (6) yabbse/poc.php, or (7) the sourcedir parameter to yabbse/poc.php.

Vulnerable Product Search on Vulmon Subscribe to Product

phpopenchat phpopenchat 2.3.4

phpopenchat phpopenchat 3.0.1

Exploits

source: wwwsecurityfocuscom/bid/12817/info PHPOpenChat is prone to multiple remote file-include vulnerabilities An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process This may facilitate unauthorized access PHPOpenChat 301 and prior ...
source: wwwsecurityfocuscom/bid/12817/info PHPOpenChat is prone to multiple remote file-include vulnerabilities An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process This may facilitate unauthorized access PHPOpenChat 301 and prior ver ...
source: wwwsecurityfocuscom/bid/12817/info PHPOpenChat is prone to multiple remote file-include vulnerabilities An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process This may facilitate unauthorized access PHPOpenChat 301 and pri ...