Directory traversal vulnerability in dwnld.php in GuppY 4.5.11 allows remote attackers to overwrite arbitrary files via a "%2E." (mixed encoding) in the pg parameter.
References
Link | Resource |
---|---|
http://secunia.com/advisories/19222 | Exploit Patch Vendor Advisory |
http://securityreason.com/securityalert/569 | |
http://securitytracker.com/id?1015753 | Exploit Patch Vendor Advisory |
http://www.freeguppy.org/?lng=en | Patch |
http://www.kapda.ir/advisory-291.html | Exploit Patch Vendor Advisory |
http://www.osvdb.org/23846 | |
http://www.osvdb.org/23993 | |
http://www.securityfocus.com/archive/1/427329/100/0/threaded | |
http://www.securityfocus.com/bid/17068 | Exploit Patch |
http://www.vupen.com/english/advisories/2006/0936 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25141 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2006-03-14 11:02
Updated : 2018-10-18 16:31
NVD link : CVE-2006-1224
Mitre link : CVE-2006-1224
CVE.ORG link : CVE-2006-1224
JSON object : View
Products Affected
guppy
- guppy
CWE