Filtered by vendor Mapos Scripts
Subscribe
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2007-4325 | 1 Mapos Scripts | 1 Gaestebuch | 2018-10-15 | 6.8 MEDIUM | N/A |
PHP remote file inclusion vulnerability in index.php in Gaestebuch 1.5 allows remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter. | |||||
CVE-2007-4326 | 1 Mapos Scripts | 1 Bilder Uploader | 2018-10-15 | 6.8 MEDIUM | N/A |
Multiple PHP remote file inclusion vulnerabilities in Bilder Uploader 1.3 allow remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter to (1) gruppen.php, (2) bild.php, (3) feed.php, (4) mitglieder.php, (5) online.php, (6) profil.php, and possibly other unspecified PHP scripts. | |||||
CVE-2007-4327 | 1 Mapos Scripts | 1 File Uploader | 2018-10-15 | 6.8 MEDIUM | N/A |
Multiple PHP remote file inclusion vulnerabilities in File Uploader 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter to (1) index.php or (2) datei.php. | |||||
CVE-2007-4328 | 1 Mapos Scripts | 1 Bilder Galerie | 2018-10-15 | 6.8 MEDIUM | N/A |
Multiple PHP remote file inclusion vulnerabilities in Mapos Bilder Galerie 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter to (1) index.php, (2) galerie.php, or (3) anzagien.php. NOTE: A later report states that 1.1 is also affected, but that the filename for vector 3 is anzeigen.php. | |||||
CVE-2007-4329 | 1 Mapos Scripts | 1 Web News | 2018-10-15 | 6.8 MEDIUM | N/A |
Multiple PHP remote file inclusion vulnerabilities in Web News 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter to (1) index.php, (2) news.php, or (3) feed.php. | |||||
CVE-2007-4330 | 1 Mapos Scripts | 1 Shoutbox | 2018-10-15 | 6.8 MEDIUM | N/A |
PHP remote file inclusion vulnerability in shoutbox.php in Shoutbox 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the root parameter. |