Description
pixlie.php in Pixlie 1.7 allows remote attackers to trigger the reading and JPEG image processing of files in a remote directory tree via a URL in the root parameter. NOTE: this can be leveraged for traffic amplification or other denial of service.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2007-4297 | pixlie.php in Pixlie 1.7 allows remote attackers to trigger the reading and JPEG image processing of files in a remote directory tree via a URL in the root parameter. NOTE: this can be leveraged for traffic amplification or other denial of service. |
References
| Link | Providers |
|---|---|
| https://www.exploit-db.com/exploits/4278 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T14:53:55.125Z
Reserved: 2007-08-13T00:00:00.000Z
Link: CVE-2007-4314
No data.
Status : Modified
Published: 2007-08-13T21:17:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-4314
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD