Vulnerability Description
sendpm.php in PBLang 4.63 allows remote authenticated users to read arbitrary files via a full pathname in the orig parameter.
CVSS Score
2.1
LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pblang | Pblang | 4.0 |
References
- http://marc.info/?l=bugtraq&m=110971002211589&w=2
- http://pblforum.drmartinus.de/post.php?cat=2&fid=2&pid=40&page=1
- http://www.securityfocus.com/bid/12690ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19544
- http://marc.info/?l=bugtraq&m=110971002211589&w=2
- http://pblforum.drmartinus.de/post.php?cat=2&fid=2&pid=40&page=1
- http://www.securityfocus.com/bid/12690ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19544
FAQ
What is CVE-2005-0630?
CVE-2005-0630 is a vulnerability with a CVSS score of 2.1 (LOW). sendpm.php in PBLang 4.63 allows remote authenticated users to read arbitrary files via a full pathname in the orig parameter.
How severe is CVE-2005-0630?
CVE-2005-0630 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0630?
Check the references section above for vendor advisories and patch information. Affected products include: Pblang Pblang.