Логотип exploitDog
bind:CVE-2006-6465
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-6465

Количество 2

Количество 2

nvd логотип

CVE-2006-6465

около 19 лет назад

Directory traversal vulnerability in WBmap.php in WikyBlog 1.3.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter. NOTE: CVE disputes this vulnerability because l is validated by ctype_alpha before use

CVSS2: 6.5
EPSS: Низкий
github логотип

GHSA-jmq8-c9qv-c8x5

почти 4 года назад

** DISPUTED ** Directory traversal vulnerability in WBmap.php in WikyBlog 1.3.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter. NOTE: CVE disputes this vulnerability because l is validated by ctype_alpha before use.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2006-6465

Directory traversal vulnerability in WBmap.php in WikyBlog 1.3.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter. NOTE: CVE disputes this vulnerability because l is validated by ctype_alpha before use

CVSS2: 6.5
1%
Низкий
около 19 лет назад
github логотип
GHSA-jmq8-c9qv-c8x5

** DISPUTED ** Directory traversal vulnerability in WBmap.php in WikyBlog 1.3.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter. NOTE: CVE disputes this vulnerability because l is validated by ctype_alpha before use.

1%
Низкий
почти 4 года назад

Уязвимостей на страницу