Multiple PHP remote file inclusion vulnerabilities in OpenDock FullCore 4.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the doc_directory parameter in (1) sw/index_sw.php; (2) cart.php, (3) lib_cart.php, (4) lib_read_cart.php, (5) lib_sys_cart.php, and (6) txt_info_cart.php in sw/lib_cart/; (7) comment.php, (8) find_comment.php, and (9) lib_comment.php in sw/lib_comment/; (10) sw/lib_find/find.php; and other unspecified PHP scripts.
Link | Tags |
---|---|
http://www.osvdb.org/29913 | vdb entry |
http://www.osvdb.org/29911 | vdb entry |
http://www.osvdb.org/29909 | vdb entry |
http://www.osvdb.org/29908 | vdb entry |
http://secunia.com/advisories/22410 | third party advisory |
http://www.osvdb.org/29910 | vdb entry |
http://www.osvdb.org/29915 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29578 | vdb entry |
http://www.osvdb.org/29914 | vdb entry |
https://www.exploit-db.com/exploits/2570 | exploit |
http://www.osvdb.org/29907 | vdb entry |
http://www.osvdb.org/29912 | vdb entry |
http://www.vupen.com/english/advisories/2006/4052 | vdb entry |
http://www.osvdb.org/29906 | vdb entry |
http://www.securityfocus.com/bid/20573 | vdb entry exploit |