7.5
CVSSv2

CVE-2005-2155

Published: 06/07/2005 Updated: 10/09/2008
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 775
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

PHP remote file inclusion vulnerability in EasyPHPCalendar 6.1.5 and previous versions allows remote malicious users to execute arbitrary code via the serverPath parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

easyphpcalendar easyphpcalendar 6.1.5

Exploits

source: wwwsecurityfocuscom/bid/14131/info EasyPHPCalendar is prone to multiple remote file include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker may leverage any of these issues to execute arbitrary server-side script code on an affected computer with th ...
source: wwwsecurityfocuscom/bid/14131/info EasyPHPCalendar is prone to multiple remote file include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker may leverage any of these issues to execute arbitrary server-side script code on an affected computer with the pr ...
source: wwwsecurityfocuscom/bid/14131/info EasyPHPCalendar is prone to multiple remote file include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker may leverage any of these issues to execute arbitrary server-side script code on an affected computer with the ...
source: wwwsecurityfocuscom/bid/14131/info EasyPHPCalendar is prone to multiple remote file include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker may leverage any of these issues to execute arbitrary server-side script code on an affected computer with the priv ...
source: wwwsecurityfocuscom/bid/14131/info EasyPHPCalendar is prone to multiple remote file include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker may leverage any of these issues to execute arbitrary server-side script code on an affected computer with ...