CVE-2005-1881

N/A Unknown
Published: June 06, 2005 Modified: April 16, 2026
View on NVD

Description

upload.php in YaPiG 0.92b, 0.93u and 0.94u does not properly restrict the file extension for uploaded image files, which allows remote attackers to upload arbitrary files and execute arbitrary PHP code.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/15600/
Source: cve@mitre.org
Broken Link Vendor Advisory
http://securitytracker.com/id?1014103
Source: cve@mitre.org
Broken Link Exploit Third Party Advisory VDB Entry Vendor Advisory
http://secwatch.org/advisories/secwatch/20050530_yapig.txt
Source: cve@mitre.org
Broken Link Vendor Advisory
http://www.osvdb.org/17115
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/15600/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://securitytracker.com/id?1014103
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit Third Party Advisory VDB Entry Vendor Advisory
http://secwatch.org/advisories/secwatch/20050530_yapig.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://www.osvdb.org/17115
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
6.7%
91th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

yapig