Page 3 of 17 results (0.006 seconds)

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 4

Directory traversal vulnerability in codelib/cfg/common.inc.php in Phpkobo Address Book Script 1.09, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the LANG_CODE parameter. Vulnerabilidad de salto de directorio en codelib/cfg/common.inc.php en Phpkobo Address Book Script v1.09, cuando magic_quotes_gpc está deshabilitado, permite a atacantes remotos incluir y ejecutar ficheros locales de forma arbitraria a través de .. (punto punto)en el parámetro "LANG_CODE". • https://www.exploit-db.com/exploits/11754 http://osvdb.org/63003 http://packetstormsecurity.org/1003-exploits/addressbookscript-lfi.txt http://secunia.com/advisories/38938 http://www.exploit-db.com/exploits/11754 http://www.securityfocus.com/bid/38731 https://exchange.xforce.ibmcloud.com/vulnerabilities/56910 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 4

Directory traversal vulnerability in staff/app/common.inc.php in Phpkobo Short URL 1.01, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the LANG_CODE parameter. Vulnerabilidad de salto de directorio en staff/app/common.inc.php en Phpkobo Short URL v1.01, cuando magic_quotes_gpc es desactivada, permite a atacantes remotos incluir o ejecutar arvhivos locales de su elección a através del carracter .. (punto punto) en el parámtro LANG_CODE. • https://www.exploit-db.com/exploits/11775 http://packetstormsecurity.org/1003-exploits/shorturl-lfi.txt http://secunia.com/advisories/38968 http://www.exploit-db.com/exploits/11775 http://www.securityfocus.com/bid/38731 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 4

Directory traversal vulnerability in codelib/sys/common.inc.php in Phpkobo Free Real Estate Contact Form 1.09, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the LANG_CODE parameter. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en codelib/sys/common.inc.php en Phpkobo Free Real Estate Contact Form v1.09, cuando magic_quotes_gpc está desactivado, permite a atacantes remotos incluir y ejecutar de forma arbitraría ficheros locales a través de .. (punto punto) en el parámetro "LANG_CODE". • https://www.exploit-db.com/exploits/11773 http://packetstormsecurity.org/1003-exploits/frecf-lfi.txt http://secunia.com/advisories/38967 http://www.exploit-db.com/exploits/11773 http://www.securityfocus.com/bid/38731 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

Multiple directory traversal vulnerabilities in Phpkobo Short URL 1.01, when magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the LANG_CODE parameter to (1) url/app/common.inc.php and (2) codelib/cfg/common.inc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Múltiples vulnerabilidades de salto de directorio en Phpkobo Short URL v1.01, cuando magic_quotes_gpc es desactiva, permite a atacantes remotos incluir y ejecutar archivos locales de su elección a través de una secuencia de salto de directorio en el parámetro LANG_CODE en (1) url/app/common.inc.php y (2) codelib/cfg/common.inc.php. NOTA: el origen de esta información es desconocido, los detalles se han obtenido de terceras partes solamente. • http://secunia.com/advisories/38968 http://www.securityfocus.com/bid/38731 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

Multiple directory traversal vulnerabilities in Phpkobo Free Real Estate Contact Form 1.09, when magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the LANG_CODE parameter to (1) codelib/cfg/common.inc.php, (2) form/app/common.inc.php, and (3) staff/app/common.inc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Múltiples vulnerabilidades de salto de directorio en Phpkobo Free Real Estate Contact Form v1.09, cuando magic_quotes_gpc se desactiva, permite a atacantes remotos incluir y ejecutar archivos locales de su elección a través de una secuencia de salto de directorio en el parámetro LANG_CODE en (1) codelib/cfg/common.inc.php, (2) form/app/common.inc.php, y(3) staff/app/common.inc.php. NOTA: el origen de esta información es desconocido, los detalles se han obtenido de terceras partes solamente. • http://secunia.com/advisories/38967 http://www.securityfocus.com/bid/38731 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •