Search criteria

6 vulnerabilities found for quixplorer by claudio_klingler

FKIE_CVE-2011-5005

Vulnerability from fkie_nvd - Published: 2011-12-25 01:55 - Updated: 2025-04-11 00:51

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13FBDE35-7E96-4CB0-AA02-20A54E25C034",
              "versionEndIncluding": "2.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "354BBE12-96AA-4F3C-8B51-CFE80E4808D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FCFC487-FDA2-4D26-8140-1F16BAA7A658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B19E0034-0B67-4A71-83E8-98A148FF89F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F06FAD64-5233-44BB-9FDA-ED019967B7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9541428-5609-43FE-BF9B-49414E64D0B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE410E3-E0AB-4C47-AB4A-7290460BB9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF42BE37-1569-4D22-9302-B1F5AB12C0B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFF152CB-58C1-4B9A-87E0-16A7E9EFF7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "83892CE6-D168-4B03-94C8-CE167326FA60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "BE727C14-8517-4996-8D34-FAF238CB3429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A9826B-068A-4923-B3C7-02EA3C732038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C03C88C-5D51-4720-90C8-EDFF288702AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B77C9D-C67F-4D46-928F-50811DEF43F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA0BD9C3-199A-4C23-B9E2-FC30C8461B0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D26478C-CF65-43D7-81F9-A2EB14F94689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B9A49E-17E4-4118-8AB4-B42259123E4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A423F65-9148-4393-BB29-0BCB72557C83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CB2420-FEDA-41E7-B650-84C71BFC0EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8995BEFE-4E47-47ED-88DA-3BA06D4B2392",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de subida no restringida de ficheros en QuiXplorer v2.3 y anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n al subir un fichero con una extensi\u00f3n ejecutable usando la opci\u00f3n de subir en index.php, accediendo posteriormente mediante una petici\u00f3n directa del fichero en un directorio no especificado"
    }
  ],
  "id": "CVE-2011-5005",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-12-25T01:55:04.523",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.exploit-db.com/exploits/18118"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.exploit-db.com/exploits/18118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-1911

Vulnerability from fkie_nvd - Published: 2009-06-04 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php.
Impacted products
Vendor Product Version
tinywebgallery tinywebgallery *
tinywebgallery tinywebgallery 1.0
tinywebgallery tinywebgallery 1.1
tinywebgallery tinywebgallery 1.01
tinywebgallery tinywebgallery 1.1.1
tinywebgallery tinywebgallery 1.1.2
tinywebgallery tinywebgallery 1.02
tinywebgallery tinywebgallery 1.2
tinywebgallery tinywebgallery 1.3
tinywebgallery tinywebgallery 1.03
tinywebgallery tinywebgallery 1.3a
tinywebgallery tinywebgallery 1.3b
tinywebgallery tinywebgallery 1.3c
tinywebgallery tinywebgallery 1.04
tinywebgallery tinywebgallery 1.4
tinywebgallery tinywebgallery 1.4.0.1
tinywebgallery tinywebgallery 1.4.0.2
tinywebgallery tinywebgallery 1.4.0.3
tinywebgallery tinywebgallery 1.4.0.4
tinywebgallery tinywebgallery 1.4.1
tinywebgallery tinywebgallery 1.4.1.1
tinywebgallery tinywebgallery 1.4.1.2
tinywebgallery tinywebgallery 1.4.1.3
tinywebgallery tinywebgallery 1.4.2
tinywebgallery tinywebgallery 1.05
tinywebgallery tinywebgallery 1.5
tinywebgallery tinywebgallery 1.5.0.1_15.08.2006
tinywebgallery tinywebgallery 1.5.0.2_17.08.2006
tinywebgallery tinywebgallery 1.5.1_03.09.2006
tinywebgallery tinywebgallery 1.5.2.1_20.09.2006_1000
tinywebgallery tinywebgallery 1.5.2.2_21.09.2006_1000
tinywebgallery tinywebgallery 1.5.2_17.09.2006_1000
tinywebgallery tinywebgallery 1.5.3.1_11.10.2006_1000
tinywebgallery tinywebgallery 1.5.3.2_12.10.2006_1000
tinywebgallery tinywebgallery 1.5.3_08.10.2006_1000
tinywebgallery tinywebgallery 1.5.4_13.10.2006
tinywebgallery tinywebgallery 1.5.5_30.10.2006_2200
tinywebgallery tinywebgallery 1.6
tinywebgallery tinywebgallery 1.6.1
tinywebgallery tinywebgallery 1.6.2
tinywebgallery tinywebgallery 1.6.3
tinywebgallery tinywebgallery 1.6.3.4
tinywebgallery tinywebgallery 1.7
tinywebgallery tinywebgallery 1.7.1
tinywebgallery tinywebgallery 1.7.2-18.04.2008
tinywebgallery tinywebgallery 1.7.3-12.05.2008
tinywebgallery tinywebgallery 1.7.3.1
tinywebgallery tinywebgallery 1.7.3.2
tinywebgallery tinywebgallery 1.7.3.3
tinywebgallery tinywebgallery 1.7.4
tinywebgallery tinywebgallery 1.7.4.1
tinywebgallery tinywebgallery 1.7.4.2
tinywebgallery tinywebgallery 1.7.4.3
tinywebgallery tinywebgallery 1.7.4.4
tinywebgallery tinywebgallery 1.7.4.5
tinywebgallery tinywebgallery 1.7.5
tinywebgallery tinywebgallery 1.7.5.1
claudio_klingler quixplorer *
claudio_klingler quixplorer 1.0
claudio_klingler quixplorer 1.1
claudio_klingler quixplorer 1.2
claudio_klingler quixplorer 1.4
claudio_klingler quixplorer 1.5
claudio_klingler quixplorer 1.6
claudio_klingler quixplorer 2.0
claudio_klingler quixplorer 2.1.1
claudio_klingler quixplorer 2.2
claudio_klingler quixplorer 2.3
claudio_klingler quixplorer 2.3.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7075F8-B97F-4B8D-8BB4-A4990FFA1604",
              "versionEndIncluding": "1.7.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC860783-7018-4421-8ACE-6F6C522E41DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "21630514-7C0A-4B74-8E3A-4F32F9366EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E4CEDD-095B-40E1-9AD5-419CC63CAA50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C5722B-0221-4CE2-84E9-C4A6007DFB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "634AAE01-C70F-4B79-9FFB-E902AED7A6DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2F0E0E-D32E-49C0-8710-B93E9D825925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "91115B08-3533-4027-B80A-3CDFDC38A915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE1A1DE-DD29-4A96-B483-1CA2B5AA59F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F0C7694-9978-4F85-8B81-A5AA558780BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CDEB37-98C9-42AD-BC50-415FEF0E5943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5A20998-E0B8-4AA4-9525-16451E163EDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F8E7335-EEA2-42AB-BFB3-D2F00303419F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3EE4A5E-DE0F-45E1-8950-53A1C35AEF15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEF8C28C-3AE4-4031-949A-B120097B93EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08EB1FD6-A790-40D0-A931-EAD9983D983C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E6D0D3-10F2-4D8C-BC26-BA4AB513B33B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "16028F35-AE2B-4C10-96C5-8C3ABBD59B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "372DA1CA-691A-4510-9ECE-86B4914ABE15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E99F2224-6DF4-4E8F-B5AD-6D474C4F27D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C0289F-F5D6-46D1-9D5F-4BBB7762E396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "864C47CE-7BE4-4927-83F1-F563C3E12034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "04274BC9-E353-4FD9-8BB6-7F431453B95C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9BA5727-3AD1-4169-8E94-231BD2CAFD24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "73AD8BD9-03BB-4E89-9D4D-50D095C38F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7468212F-EB58-4E20-888B-679D4242AC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.0.1_15.08.2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D00E3AF-4649-4AE6-AD50-1166BC89FC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.0.2_17.08.2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B0E1423-82D3-42E8-B90E-E0A2DECF9948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.1_03.09.2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "511C256A-649F-47AD-88A7-4DF6CCAB4DB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2.1_20.09.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35930C6-663F-49A8-9C05-5F9CC985ABE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2.2_21.09.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "19C91295-E4A9-45B8-916F-7A34BF553611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2_17.09.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "0028B129-B45A-46A8-BD09-D3F8B383B9C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3.1_11.10.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1B7DE42-BE41-4827-966F-BFE294CD9F03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3.2_12.10.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D2C36F4-9F45-4E37-923A-5A3650132997",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3_08.10.2006_1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "F324A21B-69A7-4618-BB0B-0A5BF85A8655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.4_13.10.2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2772FF4-E46F-4859-B7B1-BA1E2966BEBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.5_30.10.2006_2200:*:*:*:*:*:*:*",
              "matchCriteriaId": "660D356C-164C-47DA-8DB4-9E45DD876FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "080E4F0F-16E8-402F-9A11-2326469D65C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC23AAE-37F6-4842-9BB7-E46BB6348B1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F8B14D-F020-4C93-A9A6-EEBF14A910B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FFFABF7-960A-4BB9-BCCC-C7CB4FCEA946",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "09EE1C8F-F520-4E77-BF1E-CDFC4F33FD5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7E5B-A04E-48E2-8761-11C8661C1D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8412E8AF-BDB8-4DCF-AFEA-E3E69F37DC0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.2-18.04.2008:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B77756A-09FA-4B82-BF4F-FB15EEB66F2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3-12.05.2008:*:*:*:*:*:*:*",
              "matchCriteriaId": "153B15B9-280D-437A-B605-73879A0A1CCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "12116393-BFD8-473F-956F-5F6C0B27C63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "363CC2F1-493E-42EB-ABF5-AECBBAEE64DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1591D7EE-1188-4EF4-8271-00B1F54EC92A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6546FC7A-5392-4741-B942-EACC360C958D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E0B254B-F9CF-4484-B7BE-331D009DDDFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3CCB8A7-BA0E-46AF-90FC-C2AE98A570F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "754912C5-01EF-4F98-9AF7-FFC4FEC5A5C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E3FAC1D-008A-4088-86EC-8A96DBDA8614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EFCC874-3498-4F1A-8B51-DCA83B4C2B80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D8EFE9-B6A9-44BC-9041-2E1CCE8FB520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30C4A2A-6759-474C-82EC-FFD97BFCEA1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE67329A-7862-470A-AF78-DA135587E442",
              "versionEndIncluding": "2.3.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "354BBE12-96AA-4F3C-8B51-CFE80E4808D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FCFC487-FDA2-4D26-8140-1F16BAA7A658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B19E0034-0B67-4A71-83E8-98A148FF89F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F06FAD64-5233-44BB-9FDA-ED019967B7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9541428-5609-43FE-BF9B-49414E64D0B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE410E3-E0AB-4C47-AB4A-7290460BB9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF42BE37-1569-4D22-9302-B1F5AB12C0B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFF152CB-58C1-4B9A-87E0-16A7E9EFF7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "83892CE6-D168-4B03-94C8-CE167326FA60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3907B16C-0DEC-40AE-BB6F-5E6317E083BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D221E893-172F-49F7-BA83-149F88BADB7C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en .include/init.php (tambi\u00e9n conocido como admin/_include/init.php) en QuiXplorer v2.3.2 y anteriores, utilizado en TinyWebGallery v1.7.6 y anteriores, permite a los atacantes remotos, incluir y ejecutar arbitrariamente archivos locales a trav\u00e9s de ..(punto punto) en el par\u00e1metro \"lang\" para admin/index.php."
    }
  ],
  "id": "CVE-2009-1911",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-06-04T16:30:00.467",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35020"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35060"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/34892"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/8649"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/34892"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/8649"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2011-5005 (GCVE-0-2011-5005)

Vulnerability from cvelistv5 – Published: 2011-12-25 01:00 – Updated: 2024-08-07 00:23
VLAI?
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:39.630Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18118",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/18118"
          },
          {
            "name": "quixplorer-index-file-upload(71323)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18118",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/18118"
        },
        {
          "name": "quixplorer-index-file-upload(71323)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5005",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18118",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/18118"
            },
            {
              "name": "quixplorer-index-file-upload(71323)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5005",
    "datePublished": "2011-12-25T01:00:00",
    "dateReserved": "2011-12-24T00:00:00",
    "dateUpdated": "2024-08-07T00:23:39.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1911 (GCVE-0-2009-1911)

Vulnerability from cvelistv5 – Published: 2009-06-04 16:00 – Updated: 2024-08-07 05:27
VLAI?
Summary
Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/35060 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/503396/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/35020 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.tinywebgallery.com/forum/viewtopic.php… x_refsource_CONFIRM
http://www.securityfocus.com/bid/34892 vdb-entryx_refsource_BID
https://www.exploit-db.com/exploits/8649 exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:27:54.931Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35060",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35060"
          },
          {
            "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
          },
          {
            "name": "35020",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35020"
          },
          {
            "name": "tinywebgallery-init-file-include(50408)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
          },
          {
            "name": "34892",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34892"
          },
          {
            "name": "8649",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8649"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35060",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35060"
        },
        {
          "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
        },
        {
          "name": "35020",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35020"
        },
        {
          "name": "tinywebgallery-init-file-include(50408)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
        },
        {
          "name": "34892",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34892"
        },
        {
          "name": "8649",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8649"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1911",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35060",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35060"
            },
            {
              "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
            },
            {
              "name": "35020",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35020"
            },
            {
              "name": "tinywebgallery-init-file-include(50408)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
            },
            {
              "name": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653",
              "refsource": "CONFIRM",
              "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
            },
            {
              "name": "34892",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34892"
            },
            {
              "name": "8649",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8649"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1911",
    "datePublished": "2009-06-04T16:00:00",
    "dateReserved": "2009-06-04T00:00:00",
    "dateUpdated": "2024-08-07T05:27:54.931Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5005 (GCVE-0-2011-5005)

Vulnerability from nvd – Published: 2011-12-25 01:00 – Updated: 2024-08-07 00:23
VLAI?
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:39.630Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18118",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/18118"
          },
          {
            "name": "quixplorer-index-file-upload(71323)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18118",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/18118"
        },
        {
          "name": "quixplorer-index-file-upload(71323)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5005",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18118",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/18118"
            },
            {
              "name": "quixplorer-index-file-upload(71323)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5005",
    "datePublished": "2011-12-25T01:00:00",
    "dateReserved": "2011-12-24T00:00:00",
    "dateUpdated": "2024-08-07T00:23:39.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1911 (GCVE-0-2009-1911)

Vulnerability from nvd – Published: 2009-06-04 16:00 – Updated: 2024-08-07 05:27
VLAI?
Summary
Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/35060 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/503396/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/35020 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.tinywebgallery.com/forum/viewtopic.php… x_refsource_CONFIRM
http://www.securityfocus.com/bid/34892 vdb-entryx_refsource_BID
https://www.exploit-db.com/exploits/8649 exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:27:54.931Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35060",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35060"
          },
          {
            "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
          },
          {
            "name": "35020",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35020"
          },
          {
            "name": "tinywebgallery-init-file-include(50408)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
          },
          {
            "name": "34892",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34892"
          },
          {
            "name": "8649",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8649"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35060",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35060"
        },
        {
          "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
        },
        {
          "name": "35020",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35020"
        },
        {
          "name": "tinywebgallery-init-file-include(50408)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
        },
        {
          "name": "34892",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34892"
        },
        {
          "name": "8649",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8649"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1911",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35060",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35060"
            },
            {
              "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded"
            },
            {
              "name": "35020",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35020"
            },
            {
              "name": "tinywebgallery-init-file-include(50408)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408"
            },
            {
              "name": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653",
              "refsource": "CONFIRM",
              "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653"
            },
            {
              "name": "34892",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34892"
            },
            {
              "name": "8649",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8649"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1911",
    "datePublished": "2009-06-04T16:00:00",
    "dateReserved": "2009-06-04T00:00:00",
    "dateUpdated": "2024-08-07T05:27:54.931Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}