CVE-2005-1869

PHP remote file inclusion vulnerability in start_lobby.php in MWChat 6.x allows remote attackers to execute arbitrary PHP code via the CONFIG[MWCHAT_Libs] parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:appindex:mwchat:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:58

Type Values Removed Values Added
References () http://secunia.com/advisories/15596 - () http://secunia.com/advisories/15596 -
References () http://www.appindex.net - Patch, Vendor Advisory () http://www.appindex.net - Patch, Vendor Advisory
References () http://www.defacers.com.mx/advisories/4.txt - Exploit, Vendor Advisory, URL Repurposed () http://www.defacers.com.mx/advisories/4.txt - Exploit, Vendor Advisory, URL Repurposed
References () http://www.osvdb.org/17087 - Vendor Advisory () http://www.osvdb.org/17087 - Vendor Advisory
References () http://www.securitytracker.com/alerts/2005/Jun/1014090.html - Patch, Vendor Advisory () http://www.securitytracker.com/alerts/2005/Jun/1014090.html - Patch, Vendor Advisory

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://www.defacers.com.mx/advisories/4.txt - Exploit, Vendor Advisory (MISC) http://www.defacers.com.mx/advisories/4.txt - Exploit, Vendor Advisory, URL Repurposed

Information

Published : 2005-06-07 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2005-1869

Mitre link : CVE-2005-1869

CVE.ORG link : CVE-2005-1869


JSON object : View

Products Affected

appindex

  • mwchat