CVE-2011-3837 in Wuzlyinfo

Zusammenfassung (Englisch)

Directory traversal vulnerability in blog_system/data_functions.php in Wuzly 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the preview parameter to index.php.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Reservieren

26.09.2011

Veröffentlichung

24.12.2011

Status

Bestätigt

Einträge

VulDB provides additional information and datapoints for this CVE:

Quellen

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!