Multiple PHP remote file inclusion vulnerabilities in Rezervi Generic 0.9 allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) datumVonDatumBis.inc.php, (2) footer.inc.php, (3) header.inc.php, and (4) stylesheets.php in templates/; and (5) wochenuebersicht.inc.php, (6) monatsuebersicht.inc.php, (7) jahresuebersicht.inc.php, and (8) tagesuebersicht.inc.php in belegungsplan/.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/33737 | vdb entry |
http://osvdb.org/35006 | vdb entry |
http://osvdb.org/35009 | vdb entry |
http://www.securityfocus.com/bid/23550 | vdb entry |
http://osvdb.org/35007 | vdb entry |
https://www.exploit-db.com/exploits/3763 | exploit |
http://osvdb.org/35008 | vdb entry |
http://osvdb.org/35013 | vdb entry |
http://osvdb.org/35011 | vdb entry |
http://osvdb.org/35010 | vdb entry |
http://secunia.com/advisories/24926 | third party advisory |
http://osvdb.org/35012 | vdb entry |
http://www.vupen.com/english/advisories/2007/1448 | vdb entry |