Ezboo webstats, possibly 3.0.3, allows remote attackers to bypass authentication and gain access via a direct request to (1) update.php and (2) config.php.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://forums.avenir-geopolitique.net/viewtopic.php?t=2674 - Exploit, Vendor Advisory | |
References | () http://osvdb.org/34181 - | |
References | () http://securityreason.com/securityalert/2275 - | |
References | () http://www.securityfocus.com/archive/1/460325/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/22590 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32563 - |
Information
Published : 2007-02-21 17:28
Updated : 2024-11-21 00:27
NVD link : CVE-2007-1043
Mitre link : CVE-2007-1043
CVE.ORG link : CVE-2007-1043
JSON object : View
Products Affected
santa_cruz_operation
- sco_unix
hp
- tru64
- hp-ux
microsoft
- windows_98se
- windows_2003_server
- windows_me
- windows_nt
- windows_xp
- windows_2000
- windows_95
- windows_98
ezboo
- webstats
ibm
- aix
- os2
sun
- solaris
linux
- linux_kernel
apple
- mac_os_x
windriver
- bsdos
CWE