7 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.029 Low
EPSS
Percentile
90.7%
Directory traversal vulnerability in update/index.php in PluXml before 5.1.6 allows remote attackers to include and execute arbitrary local files via a …%2F (encoded dot dot slash) in the default_lang parameter.
CPE | Name | Operator | Version |
---|---|---|---|
pluxml:pluxml | pluxml | le | 5.1.5 |
archives.neohapsis.com/archives/bugtraq/2012-05/0011.html
osvdb.org/81638
secunia.com/advisories/49026
telechargements.pluxml.org/changelog
www.exploit-db.com/exploits/18828
www.pluxml.org/article59/sortie-de-pluxml-5-1-6
www.securityfocus.com/bid/53348
exchange.xforce.ibmcloud.com/vulnerabilities/75330
www.htbridge.com/advisory/HTB23086