PHP remote file inclusion vulnerability in index.php in Maian Gallery 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. NOTE: this issue was disputed by a third party researcher, but confirmed by the vendor, stating "this problem existed only briefly in v1.0."
References
Configurations
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2007-04/0244.html - | |
References | () http://attrition.org/pipermail/vim/2007-April/001530.html - Exploit | |
References | () http://www.osvdb.org/34149 - | |
References | () http://www.securityfocus.com/archive/1/465732/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/465853/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33692 - |
Information
Published : 2007-04-18 03:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-2076
Mitre link : CVE-2007-2076
CVE.ORG link : CVE-2007-2076
JSON object : View
Products Affected
maian
- gallery
CWE