PHP remote file inclusion vulnerability in index.php in Maian Weblog 3.1 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. NOTE: this issue was disputed by a third party researcher, since the path_to_folder variable is initialized before use
References
Configurations
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2007-04/0244.html - | |
References | () http://attrition.org/pipermail/vim/2007-April/001527.html - Exploit | |
References | () http://osvdb.org/35360 - | |
References | () http://securityreason.com/securityalert/2582 - | |
References | () http://www.securityfocus.com/archive/1/465735/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33708 - |
07 Nov 2023, 02:00
Type | Values Removed | Values Added |
---|---|---|
Summary | PHP remote file inclusion vulnerability in index.php in Maian Weblog 3.1 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. NOTE: this issue was disputed by a third party researcher, since the path_to_folder variable is initialized before use |
Information
Published : 2007-04-18 03:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-2078
Mitre link : CVE-2007-2078
CVE.ORG link : CVE-2007-2078
JSON object : View
Products Affected
maian
- weblog
CWE