Just another flat file (JAF) CMS before 3.0 Final allows remote attackers to obtain sensitive information via (1) an * (asterisk) in the id parameter, (2) a blank id parameter, or (3) an * (asterisk) in the disp parameter to index.php, which reveals the path in an error message. NOTE: a followup suggests that this may be a directory traversal or file inclusion vulnerability.
Max CVSS
5.0
EPSS Score
0.56%
Published
2005-06-28
Updated
2016-10-18
Directory traversal vulnerability in XAMPP before 1.4.14 allows remote attackers to inject arbitrary HTML and PHP code via lang.php.
Max CVSS
5.0
EPSS Score
0.47%
Published
2005-06-17
Updated
2008-09-05
Directory traversal vulnerability in folderview.asp for Blue-Collar Productions i-Gallery 3.3 allows remote attackers to read arbitrary files and directories via the folder parameter.
Max CVSS
5.0
EPSS Score
0.60%
Published
2005-06-20
Updated
2016-10-18
Directory traversal vulnerability in Edgewall Trac 0.8.3 and earlier allows remote attackers to read or write arbitrary files via a .. (dot dot) in the id parameter to the (1) upload or (2) attachment scripts.
Max CVSS
6.4
EPSS Score
0.23%
Published
2005-06-19
Updated
2008-09-05
Directory traversal vulnerability in pafiledb.php in paFileDB 3.1 and earlier allows remote attackers to include arbitrary files via a .. (dot dot) in the action parameter.
Max CVSS
5.0
EPSS Score
0.72%
Published
2005-06-15
Updated
2016-10-18
Directory traversal vulnerability in admin.php in McGallery 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the lang parameter.
Max CVSS
5.0
EPSS Score
2.00%
Published
2005-06-15
Updated
2016-10-18
Directory traversal vulnerability in InteractivePHP FusionBB .11 Beta and earlier allows remote attackers to include arbitrary local files via ".." sequences in the language parameter.
Max CVSS
7.5
EPSS Score
0.34%
Published
2005-06-16
Updated
2008-09-05
Directory traversal vulnerability in Pico Server (pServ) 3.3 allows remote attackers to read arbitrary files and execute arbitrary commands via a /./ (slash dot slash) before each .. (dot dot) sequence in the URL, which results in an incorrect directory depth count.
Max CVSS
7.5
EPSS Score
0.50%
Published
2005-06-16
Updated
2016-10-18
Directory traversal vulnerability in the IMAP service for SPA-PRO Mail @Solomon 4.00 allows remote authenticated users to read other users' mail and perform operations on arbitrary directories via .. sequences in the (1) SELECT, (2) CREATE, (3) DELETE, and (4) RENAME commands.
Max CVSS
3.6
EPSS Score
0.62%
Published
2005-06-09
Updated
2017-07-11
Directory traversal vulnerability in thumb.php in FlatNuke 2.5.3 allows remote attackers to read arbitrary images or obtain the installation path via the image parameter.
Max CVSS
5.0
EPSS Score
2.75%
Published
2005-06-09
Updated
2011-03-08
Directory traversal vulnerability in the (1) rmdir or (2) mkdir commands in upload.php in YaPiG 0.92b, 0.93u and 0.94u allows remote attackers to create or delete arbitrary directories via a .. (dot dot) in the dir parameter.
Max CVSS
6.4
EPSS Score
6.38%
Published
2005-06-09
Updated
2008-09-05
Directory traversal vulnerability in Dzip before 2.9 allows remote attackers to create arbitrary files via a filename containing a .. (dot dot) in a .dz archive.
Max CVSS
5.0
EPSS Score
0.75%
Published
2005-06-09
Updated
2011-03-08
Directory traversal vulnerability in class.layout_phpcms.php in phpCMS 1.2.x before 1.2.1pl2 allows remote attackers to read or include arbitrary files, as demonstrated using a .. (dot dot) in the language parameter to parser.php.
Max CVSS
5.0
EPSS Score
0.71%
Published
2005-06-02
Updated
2016-10-18
Directory traversal vulnerability in FutureSoft TFTP Server Evaluation Version 1.0.0.1 allows remote attackers to read arbitrary files via a TFTP GET request containing (1) "../" (dot dot slash) or (2) "..\" (dot dot backslash) sequences.
Max CVSS
7.8
EPSS Score
0.99%
Published
2005-06-01
Updated
2008-09-05
14 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!