Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2005-1921

EPSS 86.15% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2005-1921

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
XML-RPC/PHP-XMLRPC 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PEAR XML_RPC及PHPXMLRPC是在较多网站应用系统中使用的功能模块。 PEAR XML_RPC 1.3.0及之前版本(也称为XML-RPC或xmlrpc)以及PHPXMLRPC (也称为XML-RPC For PHP或php-xmlrpc) 1.1及之前版本中存在代码注入漏洞。 由于在使用文件前没有进行适当的检验处理,远程攻击者可通过XML文件,利用此漏洞执行任意PHP代码。 多个使用这些模块的产品,包括WordPress, Serendipity,Drupal,egroupware, Ma
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2005-1921

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2005-1921

登录查看更多情报信息。

Same Patch Batch · n/a · 2005-07-01 · 24 CVEs total

CVE-2005-0393Crip HelperScripts 未知安全漏洞
CVE-2005-2115ravensoft soldier2 ignore 拒绝服务漏洞
CVE-2005-2114Mozilla 多个浏览器软件 javascript 拒绝服务漏洞
CVE-2005-2113XOOPS XMLRPC SQL注入漏洞
CVE-2005-2112XOOPS 多个 跨站脚本攻击漏洞
CVE-2005-2111needscripts.com CommunityLinkPro login.cgi 命令执行漏洞
CVE-2005-2110WordPress 多个 信息泄露漏洞
CVE-2005-2109WordPress wp-login.php 信息篡改漏洞
CVE-2005-2108免费软件 WordPress XMLRPC SQL注入漏洞
CVE-2005-2107WordPress post.php 跨站脚本攻击漏洞
CVE-2005-2106Drupal 未知 PHP代码执行漏洞
CVE-2005-2105Cisco IOS AAA-Radius 绕过认证漏洞
CVE-2004-2144Baal Smart Forms认证绕过漏洞
CVE-2005-0360Microsoft pkmcore LogSinkClass 文件处理漏洞
CVE-2004-2153Real Estate Management Software多个未明的漏洞
CVE-2004-2152MediaWiki Raw Page跨站脚本漏洞
CVE-2004-2151Virtual Projects Chatma拒绝服务漏洞
CVE-2004-2150Nettica Corporation INTELLIPEER Email Server用户账户枚举漏洞
CVE-2004-2149Oracle MySQL 缓冲区错误漏洞
CVE-2004-2148Slava Astashonok Fprobe未明的本地漏洞

Showing top 20 of 24 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2005-1921

No comments yet


Leave a comment