Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2005-2330
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in extras/update.php in osCommerce 2.2 allows remote attackers to read arbitrary files via (1) .. sequences or (2) a full pathname in the readme_file parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
osCommerce extras/update.php 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
osCommerce是一套电子商务与线上商店管理的软件。基于php和mysql,它能够被使用在任何的web server上。它是采用GNU General Public License授权的自由软件。 osCommerce 2.2的extras/update.php存在目录遍历漏洞。远程攻击者可以通过readme_file参数中的(1)".."(参数值包含'..')序列或(2)完整路径名读取任意文件从而造成信息泄露。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2005-2330
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2005-2330
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2005-2330

No comments yet


Leave a comment