CVE-2005-0859

N/A Unknown
Published: May 02, 2005 Modified: April 16, 2026
View on NVD

Description

PHP remote file inclusion vulnerability in CzarNews 1.13b allows remote attackers to execute arbitrary PHP code via the tpath parameter to (1) headlines.php or (2) news.php. NOTE: some sources have reported the "dir" parameter as being affected; however, this is likely a cut-and-paste error from the wrong section of the original vulnerability report. Also, the news.php version was later reported to be in 1.12 through 1.14.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/14670
Source: cve@mitre.org
Patch Vendor Advisory
http://www.osvdb.org/14925
Source: cve@mitre.org
http://www.osvdb.org/14926
Source: cve@mitre.org
http://secunia.com/advisories/14670
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://securitytracker.com/id?1013486
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/14925
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/14926
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/12857
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/18411
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/19765
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27733
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/2009
Source: af854a3a-2127-422b-91ae-364da2661108

18 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
17.2%
95th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

czaries_network