CVE-2006-0702

admin/upload.php in imageVue 16.1 allows remote attackers to upload arbitrary files to certain allowed folders via .. (dot dot) sequences in the path parameter. NOTE: due to the lack of details, the specific vulnerability type cannot be determined, although it might be due to directory traversal.
Configurations

Configuration 1 (hide)

cpe:2.3:a:imagevue:imagevue:0.16.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://secunia.com/advisories/18802 - Exploit, Vendor Advisory () http://secunia.com/advisories/18802 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/archive/1/424745/30/0/threaded - Exploit, Vendor Advisory () http://www.securityfocus.com/archive/1/424745/30/0/threaded - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/16594 - Exploit () http://www.securityfocus.com/bid/16594 - Exploit
References () http://www.vupen.com/english/advisories/2006/0570 - () http://www.vupen.com/english/advisories/2006/0570 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24633 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24633 -

Information

Published : 2006-02-15 11:06

Updated : 2024-11-21 00:07


NVD link : CVE-2006-0702

Mitre link : CVE-2006-0702

CVE.ORG link : CVE-2006-0702


JSON object : View

Products Affected

imagevue

  • imagevue