6.4 Medium
AI Score
Confidence
Low
2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:N/I:P/A:N
0.025 Low
EPSS
Percentile
90.0%
Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
rhn.redhat.com/errata/RHSA-2006-0549.html
secunia.com/advisories/19599
secunia.com/advisories/19775
secunia.com/advisories/19979
secunia.com/advisories/21031
secunia.com/advisories/21125
secunia.com/advisories/21135
secunia.com/advisories/21202
secunia.com/advisories/21252
secunia.com/advisories/21723
secunia.com/advisories/22225
securityreason.com/achievement_securityalert/36
securityreason.com/securityalert/677
securitytracker.com/id?1015881
support.avaya.com/elmodocs2/security/ASA-2006-175.htm
www.mandriva.com/security/advisories?name=MDKSA-2006:074
www.novell.com/linux/security/advisories/05-05-2006.html
www.redhat.com/support/errata/RHSA-2006-0567.html
www.redhat.com/support/errata/RHSA-2006-0568.html
www.securityfocus.com/archive/1/447866/100/0/threaded
www.securityfocus.com/bid/17439
www.ubuntu.com/usn/usn-320-1
www.vupen.com/english/advisories/2006/1290
exchange.xforce.ibmcloud.com/vulnerabilities/25705
issues.rpath.com/browse/RPL-683
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10196