8.4 High
AI Score
Confidence
Low
5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
0.255 Low
EPSS
Percentile
96.6%
Multiple PHP remote file inclusion vulnerabilities in Bee-hive Lite 1.2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) header parameter to (a) conad/include/rootGui.inc.php and (b) include/rootGui.inc.php; (2) mysqlCall parameter to © conad/changeEmail.inc.php, (d) conad/changeUserDetails.inc.php, (e) conad/checkPasswd.inc.php, (f) conad/login.inc.php and (g) conad/logout.inc.php; (3) mysqlcall parameter to (h) include/listall.inc.php; (4) prefix parameter to (i) show/index.php; and (5) config parameter to (j) conad/include/mysqlCall.inc.php.
CPE | Name | Operator | Version |
---|---|---|---|
magnet:bee-hive_lite | magnet bee-hive lite | le | 1.2 |
secunia.com/advisories/20814
www.osvdb.org/26815
www.osvdb.org/26816
www.osvdb.org/26817
www.osvdb.org/26818
www.osvdb.org/26819
www.osvdb.org/26820
www.osvdb.org/26821
www.osvdb.org/26822
www.osvdb.org/26823
www.osvdb.org/26824
www.securityfocus.com/bid/18654
www.vupen.com/english/advisories/2006/2516
exchange.xforce.ibmcloud.com/vulnerabilities/27386
www.exploit-db.com/exploits/1951