CVE-2008-6530

Ezonescripts Living Local - Unrestricted File Upload

Title source: rule
STIX 2.1

Description

Unrestricted file upload vulnerability in editimage.php in eZoneScripts Living Local 1.1 allows remote authenticated administrators to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the uploaded file.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Bgh7 · textwebappsphp
https://www.exploit-db.com/exploits/7408

References (3)

Core 3
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/32760
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47215
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7408

Scores

EPSS 0.0386
EPSS Percentile 88.3%

Details

Status published
Products (1)
ezonescripts/living_local 1.1
Published Mar 26, 2009
Tracked Since Feb 18, 2026