CVE-2007-2076
 
Severity Score
6.8
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
PHP remote file inclusion vulnerability in index.php in Maian Gallery 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. NOTE: this issue was disputed by a third party researcher, but confirmed by the vendor, stating "this problem existed only briefly in v1.0."
Vulnerabilidad de inclusión remota de archivo en PHP en index.php de Maian Gallery 1.0 permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro path_to_folder. NOTA: este asunto fue impugnado por un investigador de una tercera parte, pero confirmado por el vendedor, estableciendo que "este problema existió sólo brevemente en v1.0".
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-04-17 CVE Reserved
- 2007-04-18 CVE Published
- 2024-03-29 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2007-04/0244.html | Mailing List | |
http://www.osvdb.org/34149 | Vdb Entry | |
http://www.securityfocus.com/archive/1/465732/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/465853/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33692 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://attrition.org/pipermail/vim/2007-April/001530.html | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|