CVE-2005-1698

N/A Unknown
Published: May 24, 2005 Modified: April 16, 2026
View on NVD

Description

PostNuke 0.750 and 0.760RC3 allows remote attackers to obtain sensitive information via a direct request to (1) theme.php or (2) Xanthia.php in the Xanthia module, (3) user.php, (4) thelang.php, (5) text.php, (6) html.php, (7) menu.php, (8) finclude.php, or (9) button.php in the pnblocks directory in the Blocks module, (10) config.php in the NS-Multisites (aka Multisites) module, or (11) xmlrpc.php, which reveals the path in an error message.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=111670506926649&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=bugtraq&m=111670506926649&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

2 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.3%
55th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

postnuke