Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.16137 |
Category: | Remote file access |
Title: | Simple PHP Blog dir traversal |
Summary: | The remote host runs Simple PHP Blog, an open source blog written in PHP,; which allows for retrieval of arbitrary files from the web server.; These issues are due to a failure of the application to properly; sanitize user-supplied input data. |
Description: | Summary: The remote host runs Simple PHP Blog, an open source blog written in PHP, which allows for retrieval of arbitrary files from the web server. These issues are due to a failure of the application to properly sanitize user-supplied input data. Solution: Upgrade at least to version 0.3.7 r2. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N |
Cross-Ref: |
BugTraq ID: 12193 Common Vulnerability Exposure (CVE) ID: CVE-2005-0214 http://www.securityfocus.com/bid/12193 Bugtraq: 20050107 Simple PHP Blog directory traversal vulnerability (Google Search) http://marc.info/?l=bugtraq&m=110512850603989&w=2 http://archives.neohapsis.com/archives/fulldisclosure/2005-01/0210.html XForce ISS Database: sphp-dotdot-directory-traversal(18802) https://exchange.xforce.ibmcloud.com/vulnerabilities/18802 |
Copyright | Copyright (C) 2005 David Maciejak |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |