CVE-2004-0285
critical-risk
Published 2004-11-23
PHP remote file inclusion vulnerabilities in include/footer.inc.php in (1) AllMyVisitors, (2) AllMyLinks, and (3) AllMyGuests allow remote attackers to execute arbitrary PHP code via a URL in the _AMVconfig[cfg_serverpath] parameter.
Do I need to act?
!
30.0% chance of exploitation in next 30 days
EPSS score — higher than 70% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (13)
Affected Vendors
References (16)
Mailing List
http://marc.info/?l=bugtraq&m=107696209514155&w=2
Mailing List
http://marc.info/?l=bugtraq&m=107696235424865&w=2
Mailing List
http://marc.info/?l=bugtraq&m=107696291728750&w=2
Broken Link
http://www.osvdb.org/6721
Broken Link
http://www.securityfocus.com/bid/9664
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15226
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15227
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15228
Mailing List
http://marc.info/?l=bugtraq&m=107696209514155&w=2
Mailing List
http://marc.info/?l=bugtraq&m=107696235424865&w=2
Mailing List
http://marc.info/?l=bugtraq&m=107696291728750&w=2
Broken Link
http://www.osvdb.org/6721
Broken Link
http://www.securityfocus.com/bid/9664
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15226
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15227
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15228
71
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
22/34 · High
Exposure
17/34 · Moderate