2 results (0.001 seconds)

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 4

Directory traversal vulnerability in codelib/cfg/common.inc.php in Phpkobo Address Book Script 1.09, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the LANG_CODE parameter. Vulnerabilidad de salto de directorio en codelib/cfg/common.inc.php en Phpkobo Address Book Script v1.09, cuando magic_quotes_gpc está deshabilitado, permite a atacantes remotos incluir y ejecutar ficheros locales de forma arbitraria a través de .. (punto punto)en el parámetro "LANG_CODE". • https://www.exploit-db.com/exploits/11754 http://osvdb.org/63003 http://packetstormsecurity.org/1003-exploits/addressbookscript-lfi.txt http://secunia.com/advisories/38938 http://www.exploit-db.com/exploits/11754 http://www.securityfocus.com/bid/38731 https://exchange.xforce.ibmcloud.com/vulnerabilities/56910 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

Directory traversal vulnerability in staff/app/common.inc.php in Phpkobo Address Book Script 1.09, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the LANG_CODE parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de salto de directorio en staff/app/common.inc.php en Phpkobo Address Book Script v1.09, cuando magic_quotes_gpc es desactivado, permite a atacantes remotos incluir y ejecutar archivos locales de su elección a través de una secuencia de salto de directorio en el parámetro LANG_CODE. NOTA: el origen de esta información es desconocido, los detalles se han obtenido de terceras partes solamente. • http://osvdb.org/63004 http://secunia.com/advisories/38938 http://www.securityfocus.com/bid/38731 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •