Page 4 of 17 results (0.003 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

Directory traversal vulnerability in staff/app/common.inc.php in Phpkobo Address Book Script 1.09, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the LANG_CODE parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de salto de directorio en staff/app/common.inc.php en Phpkobo Address Book Script v1.09, cuando magic_quotes_gpc es desactivado, permite a atacantes remotos incluir y ejecutar archivos locales de su elección a través de una secuencia de salto de directorio en el parámetro LANG_CODE. NOTA: el origen de esta información es desconocido, los detalles se han obtenido de terceras partes solamente. • http://osvdb.org/63004 http://secunia.com/advisories/38938 http://www.securityfocus.com/bid/38731 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 4

Directory traversal vulnerability in codelib/sys/common.inc.php in Phpkobo Free Real Estate Contact Form 1.09, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the LANG_CODE parameter. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en codelib/sys/common.inc.php en Phpkobo Free Real Estate Contact Form v1.09, cuando magic_quotes_gpc está desactivado, permite a atacantes remotos incluir y ejecutar de forma arbitraría ficheros locales a través de .. (punto punto) en el parámetro "LANG_CODE". • https://www.exploit-db.com/exploits/11773 http://packetstormsecurity.org/1003-exploits/frecf-lfi.txt http://secunia.com/advisories/38967 http://www.exploit-db.com/exploits/11773 http://www.securityfocus.com/bid/38731 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •