Direct static code injection vulnerability in startsession.php in Flat Chat 2.0 allows remote attackers to execute arbitrary PHP code via the Chat Name field, which is inserted into online.txt and included by users.php. NOTE: some of these details are obtained from third party information
Reporter | Title | Published | Views | Family All 4 |
---|---|---|---|---|
Prion | Code injection | 10 Mar 200722:19 | – | prion |
Cvelist | CVE-2007-1394 | 10 Mar 200722:00 | – | cvelist |
CVE | CVE-2007-1394 | 10 Mar 200722:19 | – | cve |
securityvulns | Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl) | 12 Mar 200700:00 | – | securityvulns |
Source | Link |
---|---|
osvdb | www.osvdb.org/33890 |
exchange | www.exchange.xforce.ibmcloud.com/vulnerabilities/32882 |
secunia | www.secunia.com/advisories/24433 |
vupen | www.vupen.com/english/advisories/2007/0871 |
securityfocus | www.securityfocus.com/bid/22865 |
exploit-db | www.exploit-db.com/exploits/3428 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo