8.4 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.054 Low
EPSS
Percentile
93.0%
Multiple PHP remote file inclusion vulnerabilities in PHPmybibli 3.0.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) class_path, (2) javascript_path, and (3) include_path parameters in (a) cart.php; the (4) class_path parameter in (b) index.php; the (5) javascript_path parameter in © edit.php; the (6) include_path parameter in (d) circ.php; unspecified parameters in (e) select.php; and unspecified parameters in other files.
CPE | Name | Operator | Version |
---|---|---|---|
phpmybibli:phpmybibli | phpmybibli | le | 3.0.1 |
advisories.echo.or.id/adv/adv55-theday-2006.txt
attrition.org/pipermail/vim/2006-October/001087.html
attrition.org/pipermail/vim/2006-October/001088.html
marc.info/?l=bugtraq&m=116110988829381&w=2
www.securityfocus.com/bid/20578
www.sigb.net/patch.php
www.vupen.com/english/advisories/2006/4064
exchange.xforce.ibmcloud.com/vulnerabilities/29627