CVE-2006-6392

Directory traversal vulnerability in index.php in plx Web Studio (aka plxWebDev) plx Pay 3.2 and earlier allows remote attackers to include and execute arbitrary local files, or obtain user credentials and other sensitive information, via a .. (dot dot) in the read parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:plx_web_studio:plx_pay:*:*:*:*:*:*:*:*
cpe:2.3:a:plx_web_studio:plx_pay:3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://secunia.com/advisories/23190 - Patch, Vendor Advisory () http://secunia.com/advisories/23190 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/21379 - Vendor Advisory () http://www.securityfocus.com/bid/21379 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/4809 - () http://www.vupen.com/english/advisories/2006/4809 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30619 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30619 -

Information

Published : 2006-12-08 01:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6392

Mitre link : CVE-2006-6392

CVE.ORG link : CVE-2006-6392


JSON object : View

Products Affected

plx_web_studio

  • plx_pay