{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T11:20:28.340","vulnerabilities":[{"cve":{"id":"CVE-2004-2018","sourceIdentifier":"cve@mitre.org","published":"2004-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PHP remote file inclusion vulnerability in index.php in Php-Nuke 6.x through 7.3 allows remote attackers to execute arbitrary PHP code by modifying the modpath parameter to reference a URL on a remote web server that contains the code."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*","matchCriteriaId":"91CC84AB-0BA6-45BE-9DE8-7243FBF00EB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*","matchCriteriaId":"23264211-2992-4222-9B96-5ABEE1332C5B"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*","matchCriteriaId":"B7F76C32-E24D-4B62-88CE-2D23F457573B"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*","matchCriteriaId":"F90A3E1F-0371-45C0-A165-55D94A62C3DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*","matchCriteriaId":"F80A5D98-6C48-461F-8B96-BD32A96CDCA1"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*","matchCriteriaId":"92F4E55E-4424-4EC8-8013-9A0FFE7D3658"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*","matchCriteriaId":"9DA61C83-9CE0-4B5E-A8A1-B9C5C9D74084"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*","matchCriteriaId":"8B13CCAA-839F-406D-A7F3-975B4780425A"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*","matchCriteriaId":"1D375197-0087-479C-991B-964FB83644F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*","matchCriteriaId":"70F6320E-314D-4A8F-BC9A-29F730035C68"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*","matchCriteriaId":"8EE03D77-9AA8-4DC6-936D-0459BD26B64B"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*","matchCriteriaId":"F3E16D17-B704-4ADA-8F91-B7D96FB52909"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*","matchCriteriaId":"CA80B501-6EC3-4C8E-A83D-F08FC659CF82"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*","matchCriteriaId":"87591D05-AC0B-4047-AE5B-69EBEF63ED5B"},{"vulnerable":true,"criteria":"cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*","matchCriteriaId":"CBB90508-B7AE-4018-B88C-7A09F1EEFAB5"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0870.html","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=108482888621896&w=2","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/11625","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.osvdb.org/6222","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/10365","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.waraxe.us/index.php?modname=sa&id=29","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/16218","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0870.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=108482888621896&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/11625","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.osvdb.org/6222","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/10365","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.waraxe.us/index.php?modname=sa&id=29","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/16218","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}