CVE-2006-4651

Directory traversal vulnerability in download/index.php, and possibly download.php, in threesquared.net (aka Ben Speakman) Php download allows remote attackers to overwrite arbitrary local files via .. (dot dot) sequence in the file parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:threesquared.net:php_download_script:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () http://secunia.com/advisories/21774 - Vendor Advisory () http://secunia.com/advisories/21774 - Vendor Advisory
References () http://securityreason.com/securityalert/1528 - () http://securityreason.com/securityalert/1528 -
References () http://www.securityfocus.com/archive/1/445269/100/0/threaded - () http://www.securityfocus.com/archive/1/445269/100/0/threaded -
References () http://www.securityfocus.com/bid/19872 - () http://www.securityfocus.com/bid/19872 -
References () http://www.vupen.com/english/advisories/2006/3479 - () http://www.vupen.com/english/advisories/2006/3479 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28751 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28751 -

Information

Published : 2006-09-09 00:04

Updated : 2024-11-21 00:16


NVD link : CVE-2006-4651

Mitre link : CVE-2006-4651

CVE.ORG link : CVE-2006-4651


JSON object : View

Products Affected

threesquared.net

  • php_download_script