7.8 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.328 Low
EPSS
Percentile
97.0%
Multiple PHP remote file inclusion vulnerabilities in Rezervi Generic 0.9 allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) datumVonDatumBis.inc.php, (2) footer.inc.php, (3) header.inc.php, and (4) stylesheets.php in templates/; and (5) wochenuebersicht.inc.php, (6) monatsuebersicht.inc.php, (7) jahresuebersicht.inc.php, and (8) tagesuebersicht.inc.php in belegungsplan/.
CPE | Name | Operator | Version |
---|---|---|---|
rezervi_generic:rezervi_generic | rezervi generic | le | 0.9 |
osvdb.org/35006
osvdb.org/35007
osvdb.org/35008
osvdb.org/35009
osvdb.org/35010
osvdb.org/35011
osvdb.org/35012
osvdb.org/35013
secunia.com/advisories/24926
www.securityfocus.com/bid/23550
www.vupen.com/english/advisories/2007/1448
exchange.xforce.ibmcloud.com/vulnerabilities/33737
www.exploit-db.com/exploits/3763