Логотип exploitDog
bind:CVE-2006-5125
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-5125

Количество 2

Количество 2

nvd логотип

CVE-2006-5125

больше 19 лет назад

Directory traversal vulnerability in window.php, possibly used by home.php, in Joshua Muheim phpMyWebmin 1.0 allows remote attackers to obtain sensitive information via a directory name in the target parameter, which triggers a directory listing through the opendir function.

CVSS2: 5
EPSS: Средний
github логотип

GHSA-pch2-jm6w-3fp3

почти 4 года назад

Directory traversal vulnerability in window.php, possibly used by home.php, in Joshua Muheim phpMyWebmin 1.0 allows remote attackers to obtain sensitive information via a directory name in the target parameter, which triggers a directory listing through the opendir function.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2006-5125

Directory traversal vulnerability in window.php, possibly used by home.php, in Joshua Muheim phpMyWebmin 1.0 allows remote attackers to obtain sensitive information via a directory name in the target parameter, which triggers a directory listing through the opendir function.

CVSS2: 5
25%
Средний
больше 19 лет назад
github логотип
GHSA-pch2-jm6w-3fp3

Directory traversal vulnerability in window.php, possibly used by home.php, in Joshua Muheim phpMyWebmin 1.0 allows remote attackers to obtain sensitive information via a directory name in the target parameter, which triggers a directory listing through the opendir function.

25%
Средний
почти 4 года назад

Уязвимостей на страницу