CVE-2005-2616

ezUpload 2.2 - RCE

Title source: llm
STIX 2.1

Description

Multiple PHP file include vulnerabilities in ezUpload 2.2 allow remote attackers to execute arbitrary code via the path parameter to (1) initialize.php, (2) customize.php, (3) form.php, or (4) index.php.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Johnnie Walker · textwebappsphp
https://www.exploit-db.com/exploits/26141
exploitdb WORKING POC VERIFIED
by Johnnie Walker · textwebappsphp
https://www.exploit-db.com/exploits/26140
exploitdb WORKING POC VERIFIED
by Johnnie Walker · textwebappsphp
https://www.exploit-db.com/exploits/26143
exploitdb WORKING POC VERIFIED
by Johnnie Walker · textwebappsphp
https://www.exploit-db.com/exploits/26142

References (6)

Core 6
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/16434
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/14534
Exploit, Vendor Advisory x_refsource_misc
http://www.securiteam.com/exploits/5JP0J15GKU.html
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2005/1379
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1014723

Scores

EPSS 0.2009
EPSS Percentile 95.5%

Details

Status published
Products (1)
ezupload/ezupload 2.2
Published Aug 17, 2005
Tracked Since Feb 18, 2026