6 results (0.002 seconds)

CVSS: 6.8EPSS: 11%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in shoutbox.php in Shoutbox 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the root parameter. Vulnerabilidad de inclusión remota de archivo en PHP en shoutbox.php de Shoutbox 1.0 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro root. • https://www.exploit-db.com/exploits/30479 http://osvdb.org/36622 http://secunia.com/advisories/26396 http://securityreason.com/securityalert/2997 http://www.securityfocus.com/archive/1/475960/100/0/threaded http://www.securityfocus.com/bid/25254 http://www.vupen.com/english/advisories/2007/2835 https://exchange.xforce.ibmcloud.com/vulnerabilities/35921 •

CVSS: 6.8EPSS: 13%CPEs: 1EXPL: 4

Multiple PHP remote file inclusion vulnerabilities in Web News 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter to (1) index.php, (2) news.php, or (3) feed.php. Múltiples vulnerabilidades de inclusión remota de archivo en PHP en Web News 1.1 permiten a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro config[root_ordner] de (1) index.php, (2) news.php, o (3) feed.php. • https://www.exploit-db.com/exploits/30482 https://www.exploit-db.com/exploits/30481 https://www.exploit-db.com/exploits/30483 http://osvdb.org/36427 http://osvdb.org/36428 http://osvdb.org/36429 http://secunia.com/advisories/26398 http://securityreason.com/securityalert/2998 http://www.securityfocus.com/archive/1/475956/100/0/threaded http://www.securityfocus.com/bid/25257 http://www.vupen.com/english/advisories/2007/2839 https://exchange.xforce.ibmcloud.com/vul •

CVSS: 6.8EPSS: 25%CPEs: 1EXPL: 3

Multiple PHP remote file inclusion vulnerabilities in File Uploader 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter to (1) index.php or (2) datei.php. Múltiples vulnerabilidades de inclusión remota de archivo en PHP en File Uploader 1.1 permiten a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro config[root_ordner] de (1) index.php o (2) datei.php. • https://www.exploit-db.com/exploits/30466 https://www.exploit-db.com/exploits/30467 http://osvdb.org/36424 http://osvdb.org/36425 http://secunia.com/advisories/26397 http://securityreason.com/securityalert/3000 http://www.securityfocus.com/archive/1/475957/100/0/threaded http://www.securityfocus.com/bid/25253 http://www.vupen.com/english/advisories/2007/2832 https://exchange.xforce.ibmcloud.com/vulnerabilities/35926 •

CVSS: 6.8EPSS: 11%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in index.php in Gaestebuch 1.5 allows remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter. Vulnerabilidad de inclusión remota de archivo en PHP en index.php de Gaestebuch 1.5 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro config[root_ordner]. • https://www.exploit-db.com/exploits/30465 http://osvdb.org/37515 http://secunia.com/advisories/26401 http://securityreason.com/securityalert/2994 http://www.securityfocus.com/archive/1/475950/100/0/threaded http://www.securityfocus.com/bid/25252 http://www.vupen.com/english/advisories/2007/2837 •

CVSS: 6.8EPSS: 18%CPEs: 1EXPL: 0

Multiple PHP remote file inclusion vulnerabilities in Bilder Uploader 1.3 allow remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter to (1) gruppen.php, (2) bild.php, (3) feed.php, (4) mitglieder.php, (5) online.php, (6) profil.php, and possibly other unspecified PHP scripts. Múltiples vulnerabilidades de inclusión remota de archivo en PHP en Bilder Uploader 1.3 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro config[root_ordner] a (1) gruppen.php, (2) bild.php, (3) feed.php, (4) mitglieder.php, (5) online.php, (6) profil.php, y posiblemente otras secuencias de comandos PHP. • http://osvdb.org/36443 http://osvdb.org/36444 http://osvdb.org/36445 http://osvdb.org/36446 http://osvdb.org/36447 http://osvdb.org/36448 http://secunia.com/advisories/26399 http://securityreason.com/securityalert/2993 http://www.securityfocus.com/archive/1/475954/100/0/threaded http://www.vupen.com/english/advisories/2007/2836 https://exchange.xforce.ibmcloud.com/vulnerabilities/35922 •