CVE-2006-0371
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Directory traversal vulnerability in index.php in Noah Medling RCBlog 1.03 allows remote attackers to read arbitrary .txt files, possibly including one that stores the administrator's account name and password, via a .. (dot dot) in the post parameter..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:noah_medling:rcblog:1.03:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://evuln.com/vulns/42/summary.html
- http://www.fluffington.com/index.php?page=rcblog
- http://www.securityfocus.com/bid/16342
- http://secunia.com/advisories/18547
- http://www.osvdb.org/22680
- http://securitytracker.com/id?1015523
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27042
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24248
- http://www.securityfocus.com/archive/1/436784/30/4500/threaded
- http://www.securityfocus.com/archive/1/425392/100/0/threaded
- http://www.securityfocus.com/archive/1/422499/100/0/threaded
Scan your vulnerabilities for free. Start using Mageni today.
Mageni can help you to find, assess and manage your vulnerabilities.
Get Started for Free