CVE-2011-1099

Focalmedia.net Quick Polls < 1.0.1 - Path Traversal

Title source: rule
STIX 2.1

Description

Multiple directory traversal vulnerabilities in FocalMedia.Net Quick Polls before 1.0.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the p parameter in a preview action to index.php, or (2) delete arbitrary files via a .. (dot dot) in the p parameter in a delete action to index.php.

Exploits (1)

exploitdb WORKING POC
by Mark Stanislav · textwebappsphp
https://www.exploit-db.com/exploits/16933

References (8)

Core 8
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/43599
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/16933
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/65947
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/8121
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/46770
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/516873/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/71028

Scores

EPSS 0.0630
EPSS Percentile 91.0%

Details

CWE
CWE-22
Status published
Products (1)
focalmedia.net/quick_polls < 1.0.1
Published Mar 09, 2011
Tracked Since Feb 18, 2026