Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.16100
Kategorie:Web application abuses
Titel:QWikiwiki directory traversal vulnerability
Zusammenfassung:The remote host is running QWikiwiki, a Wiki application written in PHP.;; The remote version of this software contains a validation input flaw which may allow an attacker; to use it to read arbitrary files on the remote host with the privileges of the web server.
Beschreibung:Summary:
The remote host is running QWikiwiki, a Wiki application written in PHP.

The remote version of this software contains a validation input flaw which may allow an attacker
to use it to read arbitrary files on the remote host with the privileges of the web server.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Querverweis: BugTraq ID: 12163
Common Vulnerability Exposure (CVE) ID: CVE-2005-0283
http://www.securityfocus.com/bid/12163
Bugtraq: 20050104 QWikiwiki directory traversal vulnerability (Google Search)
http://marc.info/?l=bugtraq&m=110486832621053&w=2
http://secunia.com/advisories/12044
XForce ISS Database: qwikiwiki-directory-traversal(18748)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18748
CopyrightCopyright (C) 2005 Noam Rathaus

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.