CVE-2006-6465

Directory traversal vulnerability in WBmap.php in WikyBlog 1.3.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter. NOTE: CVE disputes this vulnerability because l is validated by ctype_alpha before use
Configurations

Configuration 1 (hide)

cpe:2.3:a:wikyblog:wikyblog:1.3.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://www.vupen.com/english/advisories/2006/4823 - () http://www.vupen.com/english/advisories/2006/4823 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30650 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30650 -
References () https://www.exploit-db.com/exploits/2875 - () https://www.exploit-db.com/exploits/2875 -

07 Nov 2023, 01:59

Type Values Removed Values Added
Summary ** DISPUTED ** Directory traversal vulnerability in WBmap.php in WikyBlog 1.3.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter. NOTE: CVE disputes this vulnerability because l is validated by ctype_alpha before use. Directory traversal vulnerability in WBmap.php in WikyBlog 1.3.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter. NOTE: CVE disputes this vulnerability because l is validated by ctype_alpha before use

Information

Published : 2006-12-11 18:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6465

Mitre link : CVE-2006-6465

CVE.ORG link : CVE-2006-6465


JSON object : View

Products Affected

wikyblog

  • wikyblog