Vulnerability Description
Eval injection vulnerability in comments.php in Advanced Poll 2.0.2 allows remote attackers to execute arbitrary PHP code via the (1) id, (2) template_set, or (3) action parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Advanced Poll | Advanced Poll | 2.0.0 |
References
- http://attrition.org/pipermail/vim/2006-October/001080.html
- http://secunia.com/advisories/10068PatchVendor Advisory
- http://www.osvdb.org/2743
- http://www.securityfocus.com/archive/1/342493Exploit
- http://www.securityfocus.com/archive/1/448007/100/0/threaded
- http://www.securityfocus.com/bid/8890
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13513
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29396
- http://attrition.org/pipermail/vim/2006-October/001080.html
- http://secunia.com/advisories/10068PatchVendor Advisory
- http://www.osvdb.org/2743
- http://www.securityfocus.com/archive/1/342493Exploit
- http://www.securityfocus.com/archive/1/448007/100/0/threaded
- http://www.securityfocus.com/bid/8890
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13513
FAQ
What is CVE-2003-1178?
CVE-2003-1178 is a vulnerability with a CVSS score of 7.5 (HIGH). Eval injection vulnerability in comments.php in Advanced Poll 2.0.2 allows remote attackers to execute arbitrary PHP code via the (1) id, (2) template_set, or (3) action parameter.
How severe is CVE-2003-1178?
CVE-2003-1178 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1178?
Check the references section above for vendor advisories and patch information. Affected products include: Advanced Poll Advanced Poll.