Total vulnerabilities in the database
module.php in ezContents 2.0.3 allows remote attackers to bypass the directory traversal protection mechanism to include and execute arbitrary local files via "....//" (doubled dot dot slash) sequences in the link parameter, which is not properly filtered using the str_replace function.
Software | From | Fixed in |
---|---|---|
visualshapers / ezcontents | 2.0.3 | 2.0.3.x |