cvelist/2006/1xxx/CVE-2006-1371.json
2019-03-18 00:19:42 +00:00

102 lines
3.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-1371",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Laurentiu Matei eXpandable Home Page (XHP) CMS 0.5 and earlier allows remote authenticated users to use the HTMLArea FileManager plugin to upload and execute arbitrary PHP files using (1) manager.php, (2) standalonemanager.php, and (3) images.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19353",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19353"
},
{
"name": "24058",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24058"
},
{
"name": "http://xhp.targetit.ro/index.php?page=3&box_id=34&action=show_single_entry&post_id=10",
"refsource": "CONFIRM",
"url": "http://xhp.targetit.ro/index.php?page=3&box_id=34&action=show_single_entry&post_id=10"
},
{
"name": "17209",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17209"
},
{
"name": "ADV-2006-1052",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1052"
},
{
"name": "xhpcms-filemanager-file-upload(25399)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25399"
},
{
"name": "20060324 XHP vendor ack/fix",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2006-March/000649.html"
},
{
"name": "1605",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1605"
},
{
"name": "24059",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24059"
}
]
}
}