Directory traversal vulnerability in examples/layout/feed-proxy.php in Jack Slocum Ext 1.0 alpha1 (Ext JS) allows remote attackers to read arbitrary files via a .. (dot dot) in the feed parameter. NOTE: analysis by third party researchers indicates that this issue might be platform dependent.
References
Configurations
History
21 Nov 2024, 00:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://attrition.org/pipermail/vim/2007-April/001545.html - | |
References | () http://attrition.org/pipermail/vim/2007-April/001546.html - | |
References | () http://attrition.org/pipermail/vim/2007-April/001549.html - | |
References | () http://osvdb.org/35561 - | |
References | () http://www.securityfocus.com/bid/23643 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33864 - | |
References | () https://www.exploit-db.com/exploits/3800 - |
Information
Published : 2007-04-26 19:19
Updated : 2025-04-09 00:30
NVD link : CVE-2007-2285
Mitre link : CVE-2007-2285
CVE.ORG link : CVE-2007-2285
JSON object : View
Products Affected
jack_slocum
- ext_js
CWE