** DISPUTED **  PHP remote file inclusion vulnerability in index.php in Maian Weblog 3.1 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter.  NOTE: this issue was disputed by a third party researcher, since the path_to_folder variable is initialized before use.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 00:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://archives.neohapsis.com/archives/bugtraq/2007-04/0244.html - | |
| References | () http://attrition.org/pipermail/vim/2007-April/001527.html - Exploit | |
| References | () http://osvdb.org/35360 - | |
| References | () http://securityreason.com/securityalert/2582 - | |
| References | () http://www.securityfocus.com/archive/1/465735/100/0/threaded - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33708 - | 
Information
                Published : 2007-04-18 03:19
Updated : 2025-04-09 00:30
NVD link : CVE-2007-2078
Mitre link : CVE-2007-2078
CVE.ORG link : CVE-2007-2078
JSON object : View
Products Affected
                maian
- weblog
CWE
                