CVE-2005-3926
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/11/2005
Last modified:
03/04/2025
Description
Direct static code injection vulnerability in error.php in GuppY 4.5.9 and earlier, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via the _SERVER[REMOTE_ADDR] parameter, which is injected into a .inc script that is later included by the main script.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:guppy:guppy:4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:guppy:guppy:4.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:guppy:guppy:4.5.3a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:guppy:guppy:4.5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:guppy:guppy:4.5.9:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rgod.altervista.org/guppy459_xpl.html
- http://secunia.com/advisories/17790
- http://securitytracker.com/id?1015279=
- http://www.securityfocus.com/archive/1/417899/100/0/threaded
- http://www.securityfocus.com/bid/15609
- http://www.vupen.com/english/advisories/2005/2635
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23318
- http://rgod.altervista.org/guppy459_xpl.html
- http://secunia.com/advisories/17790
- http://securitytracker.com/id?1015279=
- http://www.securityfocus.com/archive/1/417899/100/0/threaded
- http://www.securityfocus.com/bid/15609
- http://www.vupen.com/english/advisories/2005/2635
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23318



