Page 2 of 8 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

PHP remote file inclusion vulnerability in welcome.php in phpLDAPadmin 0.9.6 and 0.9.7 allows remote attackers to execute arbitrary PHP code via the custom_welcome_page parameter. • http://marc.info/?l=bugtraq&m=112542447219235&w=2 http://secunia.com/advisories/16617 http://www.rgod.altervista.org/phpldap.html http://www.securityfocus.com/bid/14695 https://exchange.xforce.ibmcloud.com/vulnerabilities/22103 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

Directory traversal vulnerability in welcome.php in phpLDAPadmin 0.9.6 and 0.9.7 allows remote attackers to read arbitrary files via a .. (dot dot) in the custom_welcome_page parameter. • https://www.exploit-db.com/exploits/26211 http://marc.info/?l=bugtraq&m=112542447219235&w=2 http://secunia.com/advisories/16617 http://www.rgod.altervista.org/phpldap.html http://www.securityfocus.com/bid/14695 https://exchange.xforce.ibmcloud.com/vulnerabilities/22103 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

phpldapadmin before 0.9.6c allows remote attackers to gain anonymous access to the LDAP server, even when disable_anon_bind is set, via an HTTP request to login.php with the anonymous_bind parameter set. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322423 http://www.debian.org/security/2005/dsa-790 http://www.gentoo.org/security/en/glsa/glsa-200509-04.xml •