Vulnerability Details : CVE-2005-2775
php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
Exploit prediction scoring system (EPSS) score for CVE-2005-2775
Probability of exploitation activity in the next 30 days: 3.91%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 91 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-2775
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-2775
Products affected by CVE-2005-2775
- cpe:2.3:a:phpwebnotes:phpwebnotes:2.0.0:*:*:*:*:*:*:*