Directory traversal vulnerability in index2.php in Limbo CMS 1.0.4.2 and earlier allows remote attackers to include arbitrary PHP files via ".." sequences in the option parameter.
References
Configurations
History
21 Nov 2024, 00:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://rgod.altervista.org/limbo1042_xpl.html - Exploit, Vendor Advisory | |
References | () http://secunia.com/advisories/18063/ - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/255 - | |
References | () http://securitytracker.com/id?1015364 - Exploit | |
References | () http://www.osvdb.org/21755 - | |
References | () http://www.securityfocus.com/archive/1/419470/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/15871/ - Exploit, Patch | |
References | () http://www.vupen.com/english/advisories/2005/2932 - |
Information
Published : 2005-12-17 11:03
Updated : 2024-11-21 00:03
NVD link : CVE-2005-4319
Mitre link : CVE-2005-4319
CVE.ORG link : CVE-2005-4319
JSON object : View
Products Affected
limbo_cms
- limbo_cms
CWE