Unrated severityNVD Advisory· Published Aug 26, 2012· Updated Apr 29, 2026
CVE-2012-2227
CVE-2012-2227
Description
Directory traversal vulnerability in update/index.php in PluXml before 5.1.6 allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the default_lang parameter.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- www.exploit-db.com/exploits/18828nvdExploit
- secunia.com/advisories/49026nvdVendor Advisory
- archives.neohapsis.com/archives/bugtraq/2012-05/0011.htmlnvd
- osvdb.org/81638nvd
- telechargements.pluxml.org/changelognvd
- www.pluxml.org/article59/sortie-de-pluxml-5-1-6nvd
- www.securityfocus.com/bid/53348nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/75330nvd
- www.htbridge.com/advisory/HTB23086nvd
News mentions
0No linked articles in our index yet.