Directory traversal vulnerability in download/index.php, and possibly download.php, in threesquared.net (aka Ben Speakman) Php download allows remote attackers to overwrite arbitrary local files via .. (dot dot) sequence in the file parameter.
References
Configurations
History
21 Nov 2024, 00:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21774 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1528 - | |
References | () http://www.securityfocus.com/archive/1/445269/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19872 - | |
References | () http://www.vupen.com/english/advisories/2006/3479 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28751 - |
Information
Published : 2006-09-09 00:04
Updated : 2024-11-21 00:16
NVD link : CVE-2006-4651
Mitre link : CVE-2006-4651
CVE.ORG link : CVE-2006-4651
JSON object : View
Products Affected
threesquared.net
- php_download_script
CWE