Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2004-2364

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-16 Aug, 2005 | 04:00
Updated At-08 Aug, 2024 | 01:22
Rejected At-
Credits

Cross-site request forgery (CSRF) vulnerability in PHPX 3.0 through 3.2.6 allows remote attackers to execute arbitrary commands via URLs that are automatically executed on behalf of the administrator, as demonstrated using (1) admin/page.php, (2) admin/news.php, (3) admin/user.php, (4) admin/images.php, (5) admin/page.php, or (6) admin/forums.php.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:16 Aug, 2005 | 04:00
Updated At:08 Aug, 2024 | 01:22
Rejected At:
▼CVE Numbering Authority (CNA)

Cross-site request forgery (CSRF) vulnerability in PHPX 3.0 through 3.2.6 allows remote attackers to execute arbitrary commands via URLs that are automatically executed on behalf of the administrator, as demonstrated using (1) admin/page.php, (2) admin/news.php, (3) admin/user.php, (4) admin/images.php, (5) admin/page.php, or (6) admin/forums.php.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.phpx.org/project.php?action=view&project_id=1
x_refsource_MISC
http://www.osvdb.org/5909
vdb-entry
x_refsource_OSVDB
http://securitytracker.com/id?1010061
vdb-entry
x_refsource_SECTRACK
http://www.osvdb.org/5908
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/5911
vdb-entry
x_refsource_OSVDB
http://www.securityfocus.com/bid/10284
vdb-entry
x_refsource_BID
http://www.osvdb.org/5910
vdb-entry
x_refsource_OSVDB
http://www.securityfocus.com/archive/1/362230
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/11554
third-party-advisory
x_refsource_SECUNIA
http://www.osvdb.org/5907
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.phpx.org/project.php?action=view&project_id=1
Resource:
x_refsource_MISC
Hyperlink: http://www.osvdb.org/5909
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://securitytracker.com/id?1010061
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.osvdb.org/5908
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/5911
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securityfocus.com/bid/10284
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.osvdb.org/5910
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securityfocus.com/archive/1/362230
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/11554
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.osvdb.org/5907
Resource:
vdb-entry
x_refsource_OSVDB
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.phpx.org/project.php?action=view&project_id=1
x_refsource_MISC
x_transferred
http://www.osvdb.org/5909
vdb-entry
x_refsource_OSVDB
x_transferred
http://securitytracker.com/id?1010061
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.osvdb.org/5908
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/5911
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.securityfocus.com/bid/10284
vdb-entry
x_refsource_BID
x_transferred
http://www.osvdb.org/5910
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.securityfocus.com/archive/1/362230
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/11554
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.osvdb.org/5907
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.phpx.org/project.php?action=view&project_id=1
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.osvdb.org/5909
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://securitytracker.com/id?1010061
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.osvdb.org/5908
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/5911
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securityfocus.com/bid/10284
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.osvdb.org/5910
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/362230
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/11554
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.osvdb.org/5907
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:31 Dec, 2004 | 05:00
Updated At:03 Apr, 2025 | 01:03

Cross-site request forgery (CSRF) vulnerability in PHPX 3.0 through 3.2.6 allows remote attackers to execute arbitrary commands via URLs that are automatically executed on behalf of the administrator, as demonstrated using (1) admin/page.php, (2) admin/news.php, (3) admin/user.php, (4) admin/images.php, (5) admin/page.php, or (6) admin/forums.php.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

phpx
phpx
>>phpx>>3.0.0
cpe:2.3:a:phpx:phpx:3.0.0:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.0.1
cpe:2.3:a:phpx:phpx:3.0.1:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.0.2
cpe:2.3:a:phpx:phpx:3.0.2:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.0.3
cpe:2.3:a:phpx:phpx:3.0.3:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.0.4
cpe:2.3:a:phpx:phpx:3.0.4:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.0.5
cpe:2.3:a:phpx:phpx:3.0.5:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.0.6
cpe:2.3:a:phpx:phpx:3.0.6:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.0.7
cpe:2.3:a:phpx:phpx:3.0.7:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.1.0
cpe:2.3:a:phpx:phpx:3.1.0:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.1.1
cpe:2.3:a:phpx:phpx:3.1.1:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.1.2
cpe:2.3:a:phpx:phpx:3.1.2:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.1.3
cpe:2.3:a:phpx:phpx:3.1.3:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.1.4
cpe:2.3:a:phpx:phpx:3.1.4:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.2.0
cpe:2.3:a:phpx:phpx:3.2.0:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.2.1
cpe:2.3:a:phpx:phpx:3.2.1:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.2.2
cpe:2.3:a:phpx:phpx:3.2.2:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.2.3
cpe:2.3:a:phpx:phpx:3.2.3:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.2.4
cpe:2.3:a:phpx:phpx:3.2.4:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.2.5
cpe:2.3:a:phpx:phpx:3.2.5:*:*:*:*:*:*:*
phpx
phpx
>>phpx>>3.2.6
cpe:2.3:a:phpx:phpx:3.2.6:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/11554cve@mitre.org
N/A
http://securitytracker.com/id?1010061cve@mitre.org
N/A
http://www.osvdb.org/5907cve@mitre.org
N/A
http://www.osvdb.org/5908cve@mitre.org
N/A
http://www.osvdb.org/5909cve@mitre.org
N/A
http://www.osvdb.org/5910cve@mitre.org
N/A
http://www.osvdb.org/5911cve@mitre.org
N/A
http://www.phpx.org/project.php?action=view&project_id=1cve@mitre.org
Patch
URL Repurposed
http://www.securityfocus.com/archive/1/362230cve@mitre.org
Exploit
Vendor Advisory
http://www.securityfocus.com/bid/10284cve@mitre.org
Exploit
Patch
http://secunia.com/advisories/11554af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1010061af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/5907af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/5908af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/5909af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/5910af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/5911af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.phpx.org/project.php?action=view&project_id=1af854a3a-2127-422b-91ae-364da2661108
Patch
URL Repurposed
http://www.securityfocus.com/archive/1/362230af854a3a-2127-422b-91ae-364da2661108
Exploit
Vendor Advisory
http://www.securityfocus.com/bid/10284af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
Hyperlink: http://secunia.com/advisories/11554
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1010061
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/5907
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/5908
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/5909
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/5910
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/5911
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.phpx.org/project.php?action=view&project_id=1
Source: cve@mitre.org
Resource:
Patch
URL Repurposed
Hyperlink: http://www.securityfocus.com/archive/1/362230
Source: cve@mitre.org
Resource:
Exploit
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/10284
Source: cve@mitre.org
Resource:
Exploit
Patch
Hyperlink: http://secunia.com/advisories/11554
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1010061
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/5907
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/5908
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/5909
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/5910
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/5911
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.phpx.org/project.php?action=view&project_id=1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
URL Repurposed
Hyperlink: http://www.securityfocus.com/archive/1/362230
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/10284
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found