7.7 High
AI Score
Confidence
Low
0.048 Low
EPSS
Percentile
92.8%
Multiple PHP remote file inclusion vulnerabilities in Garennes 0.6.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the repertoire_config parameter to index.php in (1) cpe/, (2) direction/, or (3) professeurs/.
osvdb.org/35771
www.securityfocus.com/bid/23479
www.vupen.com/english/advisories/2007/1389
www.exploit-db.com/exploits/3732