Directory traversal vulnerability in index.php in plx Web Studio (aka plxWebDev) plx Pay 3.2 and earlier allows remote attackers to include and execute arbitrary local files, or obtain user credentials and other sensitive information, via a .. (dot dot) in the read parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
References
Link | Resource |
---|---|
http://secunia.com/advisories/23190 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/21379 | Vendor Advisory |
http://www.vupen.com/english/advisories/2006/4809 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30619 | |
http://secunia.com/advisories/23190 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/21379 | Vendor Advisory |
http://www.vupen.com/english/advisories/2006/4809 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30619 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23190 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/21379 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/4809 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30619 - |
Information
Published : 2006-12-08 01:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6392
Mitre link : CVE-2006-6392
CVE.ORG link : CVE-2006-6392
JSON object : View
Products Affected
plx_web_studio
- plx_pay
CWE