English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 105790 CVE descriptions
and 56160 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2005-1921
Description:Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
Test IDs: 1.3.6.1.4.1.25623.1.0.54978   1.3.6.1.4.1.25623.1.0.54982   1.3.6.1.4.1.25623.1.0.54322   1.3.6.1.4.1.25623.1.0.54984   1.3.6.1.4.1.25623.1.0.54354   1.3.6.1.4.1.25623.1.0.53994   1.3.6.1.4.1.25623.1.0.53990   1.3.6.1.4.1.25623.1.0.54191   1.3.6.1.4.1.25623.1.0.54210   1.3.6.1.4.1.25623.1.0.54492   1.3.6.1.4.1.25623.1.0.54366   1.3.6.1.4.1.25623.1.0.55071   1.3.6.1.4.1.25623.1.0.53995   1.3.6.1.4.1.25623.1.0.54178   1.3.6.1.4.1.25623.1.0.53978   1.3.6.1.4.1.25623.1.0.54451   1.3.6.1.4.1.25623.1.0.54991   1.3.6.1.4.1.25623.1.0.53993   1.3.6.1.4.1.25623.1.0.54329   1.3.6.1.4.1.25623.1.0.53985   1.3.6.1.4.1.25623.1.0.55191   1.3.6.1.4.1.25623.1.0.54983   1.3.6.1.4.1.25623.1.0.54977   1.3.6.1.4.1.25623.1.0.53984  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2005-1921
Bugtraq: 20050629 Advisory 02/2005: Remote code execution in Serendipity (Google Search)
http://marc.info/?l=bugtraq&m=112008638320145&w=2
http://pear.php.net/package/XML_RPC/download/1.3.1
http://www.gulftech.org/?node=research&article_id=00087-07012005
http://www.hardened-php.net/advisory-022005.php
Debian Security Information: DSA-745 (Google Search)
http://www.debian.org/security/2005/dsa-745
Debian Security Information: DSA-747 (Google Search)
http://www.debian.org/security/2005/dsa-747
Debian Security Information: DSA-789 (Google Search)
http://www.debian.org/security/2005/dsa-789
Debian Security Information: DSA-746 (Google Search)
http://www.debian.org/security/2005/dsa-746
http://security.gentoo.org/glsa/glsa-200507-01.xml
http://security.gentoo.org/glsa/glsa-200507-06.xml
http://security.gentoo.org/glsa/glsa-200507-07.xml
HPdes Security Advisory: HPSBTU02083
http://www.securityfocus.com/archive/1/archive/1/419064/100/0/threaded
HPdes Security Advisory: SSRT051069
http://www.securityfocus.com/archive/1/archive/1/419064/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
RedHat Security Advisories: RHSA-2005:564
http://www.redhat.com/support/errata/RHSA-2005-564.html
SuSE Security Announcement: SUSE-SA:2005:051 (Google Search)
http://marc.info/?l=bugtraq&m=112605112027335&w=2
Bugtraq: 20050629 [DRUPAL-SA-2005-003] Drupal 4.6.2 / 4.5.4 fixes critical XML-RPC issue (Google Search)
http://marc.info/?l=bugtraq&m=112015336720867&w=2
SuSE Security Announcement: SUSE-SA:2005:041 (Google Search)
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
SuSE Security Announcement: SUSE-SA:2005:049 (Google Search)
http://www.novell.com/linux/security/advisories/2005_49_php.html
SuSE Security Announcement: SUSE-SR:2005:018 (Google Search)
http://www.novell.com/linux/security/advisories/2005_18_sr.html
BugTraq ID: 14088
http://www.securityfocus.com/bid/14088
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11294
http://www.vupen.com/english/advisories/2005/2827
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:350
http://securitytracker.com/id?1015336
http://secunia.com/advisories/15852
http://secunia.com/advisories/15872
http://secunia.com/advisories/15944
http://secunia.com/advisories/15947
http://secunia.com/advisories/15957
http://secunia.com/advisories/16001
http://secunia.com/advisories/18003
http://secunia.com/advisories/15810
http://secunia.com/advisories/15855
http://secunia.com/advisories/15861
http://secunia.com/advisories/15883
http://secunia.com/advisories/15884
http://secunia.com/advisories/15895
http://secunia.com/advisories/15903
http://secunia.com/advisories/15904
http://secunia.com/advisories/15916
http://secunia.com/advisories/15917
http://secunia.com/advisories/15922
http://secunia.com/advisories/16339
http://secunia.com/advisories/16693
http://secunia.com/advisories/17440
http://secunia.com/advisories/17674

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2017 E-Soft Inc. All rights reserved.