CVE-2008-4486

N/A Unknown
Published: October 08, 2008 Modified: April 23, 2026
View on NVD

Description

Directory traversal vulnerability in index.php in SAC.php (SACphp), as used in Yerba 6.3 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the mod parameter.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityfocus.com/bid/31606
Source: cve@mitre.org
Exploit
http://secunia.com/advisories/32093
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/4368
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/497103
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/31606
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.vupen.com/english/advisories/2008/2754
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/45708
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/6687
Source: af854a3a-2127-422b-91ae-364da2661108

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
15.8%
95th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

yerba